Dec 13 04:02:10.947421 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 04:02:10.947470 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 04:02:10.947498 kernel: BIOS-provided physical RAM map: Dec 13 04:02:10.947514 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 04:02:10.947527 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 04:02:10.947539 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 04:02:10.947554 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 04:02:10.947567 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 04:02:10.947583 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 04:02:10.947595 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 04:02:10.947607 kernel: NX (Execute Disable) protection: active Dec 13 04:02:10.947619 kernel: SMBIOS 2.8 present. Dec 13 04:02:10.947632 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 04:02:10.947644 kernel: Hypervisor detected: KVM Dec 13 04:02:10.947659 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 04:02:10.947677 kernel: kvm-clock: cpu 0, msr 7019b001, primary cpu clock Dec 13 04:02:10.947690 kernel: kvm-clock: using sched offset of 5229154406 cycles Dec 13 04:02:10.947705 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 04:02:10.947719 kernel: tsc: Detected 1996.249 MHz processor Dec 13 04:02:10.947733 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 04:02:10.947747 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 04:02:10.947761 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 04:02:10.947775 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 04:02:10.947792 kernel: ACPI: Early table checksum verification disabled Dec 13 04:02:10.947805 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 04:02:10.947819 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 04:02:10.947833 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 04:02:10.947846 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 04:02:10.947860 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 04:02:10.947874 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 04:02:10.947887 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 04:02:10.947901 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 04:02:10.947917 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 04:02:10.947931 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 04:02:10.947944 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 04:02:10.947957 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 04:02:10.947971 kernel: No NUMA configuration found Dec 13 04:02:10.947984 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 04:02:10.947997 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 04:02:10.948011 kernel: Zone ranges: Dec 13 04:02:10.948034 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 04:02:10.948048 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 04:02:10.948062 kernel: Normal empty Dec 13 04:02:10.948077 kernel: Movable zone start for each node Dec 13 04:02:10.948091 kernel: Early memory node ranges Dec 13 04:02:10.948105 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 04:02:10.948146 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 04:02:10.948162 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 04:02:10.948176 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 04:02:10.948190 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 04:02:10.948204 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 04:02:10.948218 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 04:02:10.948232 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 04:02:10.948246 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 04:02:10.948260 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 04:02:10.948277 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 04:02:10.948292 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 04:02:10.948306 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 04:02:10.948320 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 04:02:10.948334 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 04:02:10.948349 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 04:02:10.948363 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 04:02:10.948377 kernel: Booting paravirtualized kernel on KVM Dec 13 04:02:10.948391 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 04:02:10.948406 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 04:02:10.948423 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 04:02:10.948438 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 04:02:10.948451 kernel: pcpu-alloc: [0] 0 1 Dec 13 04:02:10.948466 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 04:02:10.948480 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 04:02:10.948494 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 04:02:10.948508 kernel: Policy zone: DMA32 Dec 13 04:02:10.948525 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 04:02:10.948543 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 04:02:10.948558 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 04:02:10.948572 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 04:02:10.948587 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 04:02:10.948601 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 123076K reserved, 0K cma-reserved) Dec 13 04:02:10.948616 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 04:02:10.948630 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 04:02:10.948644 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 04:02:10.948661 kernel: rcu: Hierarchical RCU implementation. Dec 13 04:02:10.948676 kernel: rcu: RCU event tracing is enabled. Dec 13 04:02:10.948691 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 04:02:10.948705 kernel: Rude variant of Tasks RCU enabled. Dec 13 04:02:10.948720 kernel: Tracing variant of Tasks RCU enabled. Dec 13 04:02:10.948734 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 04:02:10.948749 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 04:02:10.948763 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 04:02:10.948777 kernel: Console: colour VGA+ 80x25 Dec 13 04:02:10.948793 kernel: printk: console [tty0] enabled Dec 13 04:02:10.948808 kernel: printk: console [ttyS0] enabled Dec 13 04:02:10.948822 kernel: ACPI: Core revision 20210730 Dec 13 04:02:10.948836 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 04:02:10.948850 kernel: x2apic enabled Dec 13 04:02:10.948864 kernel: Switched APIC routing to physical x2apic. Dec 13 04:02:10.948878 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 04:02:10.948892 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 04:02:10.948906 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 04:02:10.948921 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 04:02:10.948938 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 04:02:10.948953 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 04:02:10.948967 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 04:02:10.948982 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 04:02:10.948996 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 04:02:10.949010 kernel: Speculative Store Bypass: Vulnerable Dec 13 04:02:10.949024 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 04:02:10.949038 kernel: Freeing SMP alternatives memory: 32K Dec 13 04:02:10.949052 kernel: pid_max: default: 32768 minimum: 301 Dec 13 04:02:10.949069 kernel: LSM: Security Framework initializing Dec 13 04:02:10.949083 kernel: SELinux: Initializing. Dec 13 04:02:10.949097 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 04:02:10.949112 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 04:02:10.949145 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 04:02:10.949160 kernel: Performance Events: AMD PMU driver. Dec 13 04:02:10.949174 kernel: ... version: 0 Dec 13 04:02:10.949188 kernel: ... bit width: 48 Dec 13 04:02:10.949202 kernel: ... generic registers: 4 Dec 13 04:02:10.949230 kernel: ... value mask: 0000ffffffffffff Dec 13 04:02:10.949245 kernel: ... max period: 00007fffffffffff Dec 13 04:02:10.949262 kernel: ... fixed-purpose events: 0 Dec 13 04:02:10.949276 kernel: ... event mask: 000000000000000f Dec 13 04:02:10.949291 kernel: signal: max sigframe size: 1440 Dec 13 04:02:10.949306 kernel: rcu: Hierarchical SRCU implementation. Dec 13 04:02:10.949320 kernel: smp: Bringing up secondary CPUs ... Dec 13 04:02:10.949336 kernel: x86: Booting SMP configuration: Dec 13 04:02:10.949353 kernel: .... node #0, CPUs: #1 Dec 13 04:02:10.949368 kernel: kvm-clock: cpu 1, msr 7019b041, secondary cpu clock Dec 13 04:02:10.949383 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 04:02:10.949398 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 04:02:10.949412 kernel: smpboot: Max logical packages: 2 Dec 13 04:02:10.949427 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 04:02:10.949442 kernel: devtmpfs: initialized Dec 13 04:02:10.949457 kernel: x86/mm: Memory block size: 128MB Dec 13 04:02:10.949472 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 04:02:10.949491 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 04:02:10.949506 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 04:02:10.949521 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 04:02:10.949536 kernel: audit: initializing netlink subsys (disabled) Dec 13 04:02:10.949551 kernel: audit: type=2000 audit(1734062530.264:1): state=initialized audit_enabled=0 res=1 Dec 13 04:02:10.949565 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 04:02:10.949580 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 04:02:10.949595 kernel: cpuidle: using governor menu Dec 13 04:02:10.949609 kernel: ACPI: bus type PCI registered Dec 13 04:02:10.949629 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 04:02:10.949644 kernel: dca service started, version 1.12.1 Dec 13 04:02:10.949659 kernel: PCI: Using configuration type 1 for base access Dec 13 04:02:10.949674 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 04:02:10.949689 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 04:02:10.949704 kernel: ACPI: Added _OSI(Module Device) Dec 13 04:02:10.949718 kernel: ACPI: Added _OSI(Processor Device) Dec 13 04:02:10.949733 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 04:02:10.949747 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 04:02:10.949767 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 04:02:10.949782 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 04:02:10.949796 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 04:02:10.949811 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 04:02:10.949826 kernel: ACPI: Interpreter enabled Dec 13 04:02:10.949841 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 04:02:10.949855 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 04:02:10.949870 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 04:02:10.949885 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 04:02:10.949903 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 04:02:10.950156 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 04:02:10.950320 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 04:02:10.950344 kernel: acpiphp: Slot [3] registered Dec 13 04:02:10.950359 kernel: acpiphp: Slot [4] registered Dec 13 04:02:10.950374 kernel: acpiphp: Slot [5] registered Dec 13 04:02:10.950389 kernel: acpiphp: Slot [6] registered Dec 13 04:02:10.950410 kernel: acpiphp: Slot [7] registered Dec 13 04:02:10.950425 kernel: acpiphp: Slot [8] registered Dec 13 04:02:10.950440 kernel: acpiphp: Slot [9] registered Dec 13 04:02:10.950455 kernel: acpiphp: Slot [10] registered Dec 13 04:02:10.950469 kernel: acpiphp: Slot [11] registered Dec 13 04:02:10.950501 kernel: acpiphp: Slot [12] registered Dec 13 04:02:10.950517 kernel: acpiphp: Slot [13] registered Dec 13 04:02:10.950532 kernel: acpiphp: Slot [14] registered Dec 13 04:02:10.950547 kernel: acpiphp: Slot [15] registered Dec 13 04:02:10.950561 kernel: acpiphp: Slot [16] registered Dec 13 04:02:10.950580 kernel: acpiphp: Slot [17] registered Dec 13 04:02:10.950595 kernel: acpiphp: Slot [18] registered Dec 13 04:02:10.950609 kernel: acpiphp: Slot [19] registered Dec 13 04:02:10.950624 kernel: acpiphp: Slot [20] registered Dec 13 04:02:10.950638 kernel: acpiphp: Slot [21] registered Dec 13 04:02:10.950653 kernel: acpiphp: Slot [22] registered Dec 13 04:02:10.950667 kernel: acpiphp: Slot [23] registered Dec 13 04:02:10.950682 kernel: acpiphp: Slot [24] registered Dec 13 04:02:10.950697 kernel: acpiphp: Slot [25] registered Dec 13 04:02:10.950714 kernel: acpiphp: Slot [26] registered Dec 13 04:02:10.950729 kernel: acpiphp: Slot [27] registered Dec 13 04:02:10.950744 kernel: acpiphp: Slot [28] registered Dec 13 04:02:10.950758 kernel: acpiphp: Slot [29] registered Dec 13 04:02:10.950773 kernel: acpiphp: Slot [30] registered Dec 13 04:02:10.950787 kernel: acpiphp: Slot [31] registered Dec 13 04:02:10.950802 kernel: PCI host bridge to bus 0000:00 Dec 13 04:02:10.950959 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 04:02:10.951096 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 04:02:10.951273 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 04:02:10.951410 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 04:02:10.951540 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 04:02:10.951624 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 04:02:10.951721 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 04:02:10.951811 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 04:02:10.951907 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 04:02:10.951989 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 04:02:10.952071 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 04:02:10.955215 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 04:02:10.955304 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 04:02:10.955385 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 04:02:10.955474 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 04:02:10.955559 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 04:02:10.955638 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 04:02:10.955733 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 04:02:10.955814 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 04:02:10.955895 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 04:02:10.955975 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 04:02:10.956059 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 04:02:10.956158 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 04:02:10.956249 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 04:02:10.956331 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 04:02:10.956411 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 04:02:10.956491 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 04:02:10.956577 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 04:02:10.956673 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 04:02:10.956754 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 04:02:10.956836 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 04:02:10.956918 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 04:02:10.957006 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 04:02:10.957088 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 04:02:10.957188 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 04:02:10.957284 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 04:02:10.957367 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 04:02:10.957446 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 04:02:10.957458 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 04:02:10.957466 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 04:02:10.957474 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 04:02:10.957482 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 04:02:10.957490 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 04:02:10.957503 kernel: iommu: Default domain type: Translated Dec 13 04:02:10.957511 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 04:02:10.957594 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 04:02:10.957676 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 04:02:10.957756 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 04:02:10.957768 kernel: vgaarb: loaded Dec 13 04:02:10.957776 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 04:02:10.957784 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 04:02:10.957792 kernel: PTP clock support registered Dec 13 04:02:10.957803 kernel: PCI: Using ACPI for IRQ routing Dec 13 04:02:10.957811 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 04:02:10.957819 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 04:02:10.957828 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 04:02:10.957836 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 04:02:10.957844 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 04:02:10.957852 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 04:02:10.957860 kernel: pnp: PnP ACPI init Dec 13 04:02:10.957943 kernel: pnp 00:03: [dma 2] Dec 13 04:02:10.957960 kernel: pnp: PnP ACPI: found 5 devices Dec 13 04:02:10.957968 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 04:02:10.957976 kernel: NET: Registered PF_INET protocol family Dec 13 04:02:10.957984 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 04:02:10.957992 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 04:02:10.958000 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 04:02:10.958008 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 04:02:10.958016 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 04:02:10.958027 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 04:02:10.958035 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 04:02:10.958043 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 04:02:10.958051 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 04:02:10.958059 kernel: NET: Registered PF_XDP protocol family Dec 13 04:02:10.958150 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 04:02:10.958226 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 04:02:10.958298 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 04:02:10.958370 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 04:02:10.958447 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 04:02:10.958541 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 04:02:10.958622 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 04:02:10.958703 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 04:02:10.958715 kernel: PCI: CLS 0 bytes, default 64 Dec 13 04:02:10.958723 kernel: Initialise system trusted keyrings Dec 13 04:02:10.958731 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 04:02:10.958742 kernel: Key type asymmetric registered Dec 13 04:02:10.958750 kernel: Asymmetric key parser 'x509' registered Dec 13 04:02:10.958759 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 04:02:10.958767 kernel: io scheduler mq-deadline registered Dec 13 04:02:10.958774 kernel: io scheduler kyber registered Dec 13 04:02:10.958782 kernel: io scheduler bfq registered Dec 13 04:02:10.958790 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 04:02:10.958798 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 04:02:10.958807 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 04:02:10.958815 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 04:02:10.958825 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 04:02:10.958833 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 04:02:10.958841 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 04:02:10.958849 kernel: random: crng init done Dec 13 04:02:10.958856 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 04:02:10.958865 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 04:02:10.958872 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 04:02:10.958958 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 04:02:10.958974 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 04:02:10.959047 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 04:02:10.963162 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T04:02:10 UTC (1734062530) Dec 13 04:02:10.963250 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 04:02:10.963263 kernel: NET: Registered PF_INET6 protocol family Dec 13 04:02:10.963271 kernel: Segment Routing with IPv6 Dec 13 04:02:10.963280 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 04:02:10.963288 kernel: NET: Registered PF_PACKET protocol family Dec 13 04:02:10.963297 kernel: Key type dns_resolver registered Dec 13 04:02:10.963310 kernel: IPI shorthand broadcast: enabled Dec 13 04:02:10.963319 kernel: sched_clock: Marking stable (724343012, 117989822)->(869562304, -27229470) Dec 13 04:02:10.963327 kernel: registered taskstats version 1 Dec 13 04:02:10.963335 kernel: Loading compiled-in X.509 certificates Dec 13 04:02:10.963343 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 04:02:10.963351 kernel: Key type .fscrypt registered Dec 13 04:02:10.963359 kernel: Key type fscrypt-provisioning registered Dec 13 04:02:10.963367 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 04:02:10.963377 kernel: ima: Allocated hash algorithm: sha1 Dec 13 04:02:10.963385 kernel: ima: No architecture policies found Dec 13 04:02:10.963393 kernel: clk: Disabling unused clocks Dec 13 04:02:10.963401 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 04:02:10.963409 kernel: Write protecting the kernel read-only data: 28672k Dec 13 04:02:10.963418 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 04:02:10.963426 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 04:02:10.963434 kernel: Run /init as init process Dec 13 04:02:10.963442 kernel: with arguments: Dec 13 04:02:10.963452 kernel: /init Dec 13 04:02:10.963460 kernel: with environment: Dec 13 04:02:10.963467 kernel: HOME=/ Dec 13 04:02:10.963475 kernel: TERM=linux Dec 13 04:02:10.963483 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 04:02:10.963494 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 04:02:10.963504 systemd[1]: Detected virtualization kvm. Dec 13 04:02:10.963514 systemd[1]: Detected architecture x86-64. Dec 13 04:02:10.963524 systemd[1]: Running in initrd. Dec 13 04:02:10.963533 systemd[1]: No hostname configured, using default hostname. Dec 13 04:02:10.963541 systemd[1]: Hostname set to . Dec 13 04:02:10.963550 systemd[1]: Initializing machine ID from VM UUID. Dec 13 04:02:10.963558 systemd[1]: Queued start job for default target initrd.target. Dec 13 04:02:10.963567 systemd[1]: Started systemd-ask-password-console.path. Dec 13 04:02:10.963575 systemd[1]: Reached target cryptsetup.target. Dec 13 04:02:10.963584 systemd[1]: Reached target paths.target. Dec 13 04:02:10.963594 systemd[1]: Reached target slices.target. Dec 13 04:02:10.963603 systemd[1]: Reached target swap.target. Dec 13 04:02:10.963611 systemd[1]: Reached target timers.target. Dec 13 04:02:10.963620 systemd[1]: Listening on iscsid.socket. Dec 13 04:02:10.963628 systemd[1]: Listening on iscsiuio.socket. Dec 13 04:02:10.963637 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 04:02:10.963646 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 04:02:10.963654 systemd[1]: Listening on systemd-journald.socket. Dec 13 04:02:10.963667 systemd[1]: Listening on systemd-networkd.socket. Dec 13 04:02:10.963675 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 04:02:10.963684 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 04:02:10.963692 systemd[1]: Reached target sockets.target. Dec 13 04:02:10.963709 systemd[1]: Starting kmod-static-nodes.service... Dec 13 04:02:10.963720 systemd[1]: Finished network-cleanup.service. Dec 13 04:02:10.963730 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 04:02:10.963739 systemd[1]: Starting systemd-journald.service... Dec 13 04:02:10.963748 systemd[1]: Starting systemd-modules-load.service... Dec 13 04:02:10.963757 systemd[1]: Starting systemd-resolved.service... Dec 13 04:02:10.963765 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 04:02:10.963774 systemd[1]: Finished kmod-static-nodes.service. Dec 13 04:02:10.963783 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 04:02:10.963795 systemd-journald[186]: Journal started Dec 13 04:02:10.963857 systemd-journald[186]: Runtime Journal (/run/log/journal/085277f8fc85461a90bbd18f1cbe8024) is 4.9M, max 39.5M, 34.5M free. Dec 13 04:02:10.926472 systemd-modules-load[187]: Inserted module 'overlay' Dec 13 04:02:10.992790 systemd[1]: Started systemd-journald.service. Dec 13 04:02:10.992823 kernel: audit: type=1130 audit(1734062530.979:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.992838 kernel: audit: type=1130 audit(1734062530.981:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.992851 kernel: audit: type=1130 audit(1734062530.981:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.972982 systemd-resolved[188]: Positive Trust Anchors: Dec 13 04:02:10.972992 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 04:02:10.973028 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 04:02:11.009177 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 04:02:11.009202 kernel: Bridge firewalling registered Dec 13 04:02:10.975631 systemd-resolved[188]: Defaulting to hostname 'linux'. Dec 13 04:02:11.015231 kernel: audit: type=1130 audit(1734062531.011:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.981501 systemd[1]: Started systemd-resolved.service. Dec 13 04:02:10.981994 systemd[1]: Reached target nss-lookup.target. Dec 13 04:02:11.022417 kernel: audit: type=1130 audit(1734062531.015:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:10.993601 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 04:02:11.000455 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 04:02:11.006273 systemd-modules-load[187]: Inserted module 'br_netfilter' Dec 13 04:02:11.011623 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 04:02:11.016550 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 04:02:11.032156 kernel: SCSI subsystem initialized Dec 13 04:02:11.040740 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 04:02:11.049686 kernel: audit: type=1130 audit(1734062531.041:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.049713 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 04:02:11.049727 kernel: device-mapper: uevent: version 1.0.3 Dec 13 04:02:11.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.042104 systemd[1]: Starting dracut-cmdline.service... Dec 13 04:02:11.055138 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 04:02:11.055846 systemd-modules-load[187]: Inserted module 'dm_multipath' Dec 13 04:02:11.056702 systemd[1]: Finished systemd-modules-load.service. Dec 13 04:02:11.057714 dracut-cmdline[203]: dracut-dracut-053 Dec 13 04:02:11.062936 kernel: audit: type=1130 audit(1734062531.057:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.058018 systemd[1]: Starting systemd-sysctl.service... Dec 13 04:02:11.065551 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 04:02:11.070964 systemd[1]: Finished systemd-sysctl.service. Dec 13 04:02:11.075212 kernel: audit: type=1130 audit(1734062531.071:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.136230 kernel: Loading iSCSI transport class v2.0-870. Dec 13 04:02:11.156174 kernel: iscsi: registered transport (tcp) Dec 13 04:02:11.182185 kernel: iscsi: registered transport (qla4xxx) Dec 13 04:02:11.182274 kernel: QLogic iSCSI HBA Driver Dec 13 04:02:11.240916 systemd[1]: Finished dracut-cmdline.service. Dec 13 04:02:11.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.244456 systemd[1]: Starting dracut-pre-udev.service... Dec 13 04:02:11.248209 kernel: audit: type=1130 audit(1734062531.242:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.335251 kernel: raid6: sse2x4 gen() 11884 MB/s Dec 13 04:02:11.352189 kernel: raid6: sse2x4 xor() 4957 MB/s Dec 13 04:02:11.369172 kernel: raid6: sse2x2 gen() 13412 MB/s Dec 13 04:02:11.386205 kernel: raid6: sse2x2 xor() 8005 MB/s Dec 13 04:02:11.403211 kernel: raid6: sse2x1 gen() 10381 MB/s Dec 13 04:02:11.421096 kernel: raid6: sse2x1 xor() 6649 MB/s Dec 13 04:02:11.421196 kernel: raid6: using algorithm sse2x2 gen() 13412 MB/s Dec 13 04:02:11.421226 kernel: raid6: .... xor() 8005 MB/s, rmw enabled Dec 13 04:02:11.422055 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 04:02:11.437352 kernel: xor: measuring software checksum speed Dec 13 04:02:11.437413 kernel: prefetch64-sse : 15946 MB/sec Dec 13 04:02:11.440327 kernel: generic_sse : 14335 MB/sec Dec 13 04:02:11.440414 kernel: xor: using function: prefetch64-sse (15946 MB/sec) Dec 13 04:02:11.559448 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 04:02:11.575632 systemd[1]: Finished dracut-pre-udev.service. Dec 13 04:02:11.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.577000 audit: BPF prog-id=7 op=LOAD Dec 13 04:02:11.578000 audit: BPF prog-id=8 op=LOAD Dec 13 04:02:11.579739 systemd[1]: Starting systemd-udevd.service... Dec 13 04:02:11.614572 systemd-udevd[386]: Using default interface naming scheme 'v252'. Dec 13 04:02:11.627000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.626619 systemd[1]: Started systemd-udevd.service. Dec 13 04:02:11.631794 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 04:02:11.651589 dracut-pre-trigger[393]: rd.md=0: removing MD RAID activation Dec 13 04:02:11.701934 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 04:02:11.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.704897 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 04:02:11.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:11.755311 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 04:02:11.818285 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 04:02:11.858427 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 04:02:11.858452 kernel: GPT:17805311 != 41943039 Dec 13 04:02:11.858464 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 04:02:11.858476 kernel: GPT:17805311 != 41943039 Dec 13 04:02:11.858510 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 04:02:11.858523 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 04:02:11.865155 kernel: libata version 3.00 loaded. Dec 13 04:02:11.877862 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (428) Dec 13 04:02:11.877936 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 04:02:11.879495 kernel: scsi host0: ata_piix Dec 13 04:02:11.879650 kernel: scsi host1: ata_piix Dec 13 04:02:11.879788 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 04:02:11.879803 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 04:02:11.893900 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 04:02:11.932337 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 04:02:11.941563 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 04:02:11.951611 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 04:02:11.968282 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 04:02:11.971248 systemd[1]: Starting disk-uuid.service... Dec 13 04:02:11.990388 disk-uuid[453]: Primary Header is updated. Dec 13 04:02:11.990388 disk-uuid[453]: Secondary Entries is updated. Dec 13 04:02:11.990388 disk-uuid[453]: Secondary Header is updated. Dec 13 04:02:12.003222 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 04:02:12.013192 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 04:02:12.027177 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 04:02:13.028179 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 04:02:13.028955 disk-uuid[454]: The operation has completed successfully. Dec 13 04:02:13.100524 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 04:02:13.102586 systemd[1]: Finished disk-uuid.service. Dec 13 04:02:13.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:13.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:13.124507 systemd[1]: Starting verity-setup.service... Dec 13 04:02:13.159180 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 04:02:13.463399 systemd[1]: Found device dev-mapper-usr.device. Dec 13 04:02:13.467658 systemd[1]: Mounting sysusr-usr.mount... Dec 13 04:02:13.474836 systemd[1]: Finished verity-setup.service. Dec 13 04:02:13.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.037189 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 04:02:14.037985 systemd[1]: Mounted sysusr-usr.mount. Dec 13 04:02:14.039504 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 04:02:14.041089 systemd[1]: Starting ignition-setup.service... Dec 13 04:02:14.046855 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 04:02:14.109401 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 04:02:14.109501 kernel: BTRFS info (device vda6): using free space tree Dec 13 04:02:14.109531 kernel: BTRFS info (device vda6): has skinny extents Dec 13 04:02:14.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.215005 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 04:02:14.218000 audit: BPF prog-id=9 op=LOAD Dec 13 04:02:14.219725 systemd[1]: Starting systemd-networkd.service... Dec 13 04:02:14.255060 systemd-networkd[619]: lo: Link UP Dec 13 04:02:14.255075 systemd-networkd[619]: lo: Gained carrier Dec 13 04:02:14.255619 systemd-networkd[619]: Enumeration completed Dec 13 04:02:14.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.255864 systemd-networkd[619]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 04:02:14.257142 systemd-networkd[619]: eth0: Link UP Dec 13 04:02:14.257146 systemd-networkd[619]: eth0: Gained carrier Dec 13 04:02:14.258251 systemd[1]: Started systemd-networkd.service. Dec 13 04:02:14.260207 systemd[1]: Reached target network.target. Dec 13 04:02:14.262495 systemd[1]: Starting iscsiuio.service... Dec 13 04:02:14.275256 systemd-networkd[619]: eth0: DHCPv4 address 172.24.4.161/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 04:02:14.282254 systemd[1]: Started iscsiuio.service. Dec 13 04:02:14.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.284577 systemd[1]: Starting iscsid.service... Dec 13 04:02:14.289459 iscsid[628]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 04:02:14.289459 iscsid[628]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 04:02:14.289459 iscsid[628]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 04:02:14.289459 iscsid[628]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 04:02:14.289459 iscsid[628]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 04:02:14.289459 iscsid[628]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 04:02:14.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.291062 systemd[1]: Started iscsid.service. Dec 13 04:02:14.294724 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 04:02:14.296966 systemd[1]: Starting dracut-initqueue.service... Dec 13 04:02:14.308468 systemd[1]: Finished dracut-initqueue.service. Dec 13 04:02:14.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.309750 systemd[1]: Reached target remote-fs-pre.target. Dec 13 04:02:14.311226 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 04:02:14.312769 systemd[1]: Reached target remote-fs.target. Dec 13 04:02:14.315809 systemd[1]: Starting dracut-pre-mount.service... Dec 13 04:02:14.328480 systemd[1]: Finished dracut-pre-mount.service. Dec 13 04:02:14.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.485796 systemd[1]: Finished ignition-setup.service. Dec 13 04:02:14.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.488873 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 04:02:14.900294 ignition[644]: Ignition 2.14.0 Dec 13 04:02:14.900322 ignition[644]: Stage: fetch-offline Dec 13 04:02:14.900444 ignition[644]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:14.900492 ignition[644]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:14.902876 ignition[644]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:14.903095 ignition[644]: parsed url from cmdline: "" Dec 13 04:02:14.906036 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 04:02:14.903105 ignition[644]: no config URL provided Dec 13 04:02:14.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:14.909783 systemd[1]: Starting ignition-fetch.service... Dec 13 04:02:14.903155 ignition[644]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 04:02:14.903180 ignition[644]: no config at "/usr/lib/ignition/user.ign" Dec 13 04:02:14.903193 ignition[644]: failed to fetch config: resource requires networking Dec 13 04:02:14.904009 ignition[644]: Ignition finished successfully Dec 13 04:02:14.932844 ignition[649]: Ignition 2.14.0 Dec 13 04:02:14.932874 ignition[649]: Stage: fetch Dec 13 04:02:14.933192 ignition[649]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:14.933244 ignition[649]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:14.935515 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:14.935744 ignition[649]: parsed url from cmdline: "" Dec 13 04:02:14.935755 ignition[649]: no config URL provided Dec 13 04:02:14.935768 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 04:02:14.935788 ignition[649]: no config at "/usr/lib/ignition/user.ign" Dec 13 04:02:14.939383 ignition[649]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 04:02:14.939454 ignition[649]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 04:02:14.939651 ignition[649]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 04:02:15.168502 ignition[649]: GET result: OK Dec 13 04:02:15.168713 ignition[649]: parsing config with SHA512: 9108c50d46aa74ff02c505780891668fbfd95aee77356d4fa7dc40261c7fcd5e291b1e3de4a246580b431a6d867c606ed2958dd2655fdc1e8a71c0178052d9f9 Dec 13 04:02:15.185147 unknown[649]: fetched base config from "system" Dec 13 04:02:15.185176 unknown[649]: fetched base config from "system" Dec 13 04:02:15.186155 ignition[649]: fetch: fetch complete Dec 13 04:02:15.185190 unknown[649]: fetched user config from "openstack" Dec 13 04:02:15.186168 ignition[649]: fetch: fetch passed Dec 13 04:02:15.204447 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 04:02:15.204490 kernel: audit: type=1130 audit(1734062535.191:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.189801 systemd[1]: Finished ignition-fetch.service. Dec 13 04:02:15.186238 ignition[649]: Ignition finished successfully Dec 13 04:02:15.193076 systemd[1]: Starting ignition-kargs.service... Dec 13 04:02:15.225346 ignition[655]: Ignition 2.14.0 Dec 13 04:02:15.225380 ignition[655]: Stage: kargs Dec 13 04:02:15.225674 ignition[655]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:15.225720 ignition[655]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:15.228067 ignition[655]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:15.230805 ignition[655]: kargs: kargs passed Dec 13 04:02:15.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.230901 ignition[655]: Ignition finished successfully Dec 13 04:02:15.244937 kernel: audit: type=1130 audit(1734062535.234:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.232832 systemd[1]: Finished ignition-kargs.service. Dec 13 04:02:15.236478 systemd[1]: Starting ignition-disks.service... Dec 13 04:02:15.255493 ignition[661]: Ignition 2.14.0 Dec 13 04:02:15.255522 ignition[661]: Stage: disks Dec 13 04:02:15.255771 ignition[661]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:15.255816 ignition[661]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:15.257856 ignition[661]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:15.260337 ignition[661]: disks: disks passed Dec 13 04:02:15.262087 systemd[1]: Finished ignition-disks.service. Dec 13 04:02:15.273098 kernel: audit: type=1130 audit(1734062535.263:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.260430 ignition[661]: Ignition finished successfully Dec 13 04:02:15.264185 systemd[1]: Reached target initrd-root-device.target. Dec 13 04:02:15.274299 systemd[1]: Reached target local-fs-pre.target. Dec 13 04:02:15.276490 systemd[1]: Reached target local-fs.target. Dec 13 04:02:15.278782 systemd[1]: Reached target sysinit.target. Dec 13 04:02:15.280941 systemd[1]: Reached target basic.target. Dec 13 04:02:15.284977 systemd[1]: Starting systemd-fsck-root.service... Dec 13 04:02:15.316767 systemd-fsck[669]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 04:02:15.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.331185 systemd[1]: Finished systemd-fsck-root.service. Dec 13 04:02:15.342669 kernel: audit: type=1130 audit(1734062535.332:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.334234 systemd[1]: Mounting sysroot.mount... Dec 13 04:02:15.367164 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 04:02:15.368306 systemd[1]: Mounted sysroot.mount. Dec 13 04:02:15.369601 systemd[1]: Reached target initrd-root-fs.target. Dec 13 04:02:15.377995 systemd[1]: Mounting sysroot-usr.mount... Dec 13 04:02:15.380033 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 04:02:15.381593 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 04:02:15.387198 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 04:02:15.387288 systemd[1]: Reached target ignition-diskful.target. Dec 13 04:02:15.396503 systemd[1]: Mounted sysroot-usr.mount. Dec 13 04:02:15.404825 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 04:02:15.411462 systemd[1]: Starting initrd-setup-root.service... Dec 13 04:02:15.442591 initrd-setup-root[681]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 04:02:15.444690 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (676) Dec 13 04:02:15.450590 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 04:02:15.450629 kernel: BTRFS info (device vda6): using free space tree Dec 13 04:02:15.450641 kernel: BTRFS info (device vda6): has skinny extents Dec 13 04:02:15.453936 initrd-setup-root[689]: cut: /sysroot/etc/group: No such file or directory Dec 13 04:02:15.460859 initrd-setup-root[713]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 04:02:15.466377 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 04:02:15.468827 initrd-setup-root[724]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 04:02:15.567000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.567319 systemd[1]: Finished initrd-setup-root.service. Dec 13 04:02:15.578775 kernel: audit: type=1130 audit(1734062535.567:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.568595 systemd[1]: Starting ignition-mount.service... Dec 13 04:02:15.580958 systemd[1]: Starting sysroot-boot.service... Dec 13 04:02:15.587223 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 04:02:15.587351 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 04:02:15.602395 ignition[743]: INFO : Ignition 2.14.0 Dec 13 04:02:15.603308 ignition[743]: INFO : Stage: mount Dec 13 04:02:15.603896 ignition[743]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:15.604624 ignition[743]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:15.606638 ignition[743]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:15.608563 ignition[743]: INFO : mount: mount passed Dec 13 04:02:15.609085 ignition[743]: INFO : Ignition finished successfully Dec 13 04:02:15.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.610414 systemd[1]: Finished ignition-mount.service. Dec 13 04:02:15.615131 kernel: audit: type=1130 audit(1734062535.610:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.635707 coreos-metadata[675]: Dec 13 04:02:15.635 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 04:02:15.642420 systemd[1]: Finished sysroot-boot.service. Dec 13 04:02:15.646806 kernel: audit: type=1130 audit(1734062535.642:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.660452 coreos-metadata[675]: Dec 13 04:02:15.660 INFO Fetch successful Dec 13 04:02:15.661840 coreos-metadata[675]: Dec 13 04:02:15.660 INFO wrote hostname ci-3510-3-6-b-9ccf4f3b90.novalocal to /sysroot/etc/hostname Dec 13 04:02:15.666416 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 04:02:15.666539 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 04:02:15.675481 kernel: audit: type=1130 audit(1734062535.667:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.675510 kernel: audit: type=1131 audit(1734062535.667:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:15.668666 systemd[1]: Starting ignition-files.service... Dec 13 04:02:15.679056 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 04:02:15.688137 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (752) Dec 13 04:02:15.691527 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 04:02:15.691551 kernel: BTRFS info (device vda6): using free space tree Dec 13 04:02:15.691563 kernel: BTRFS info (device vda6): has skinny extents Dec 13 04:02:15.699846 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 04:02:15.720966 ignition[771]: INFO : Ignition 2.14.0 Dec 13 04:02:15.720966 ignition[771]: INFO : Stage: files Dec 13 04:02:15.722045 ignition[771]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:15.722045 ignition[771]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:15.723866 ignition[771]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:15.727689 ignition[771]: DEBUG : files: compiled without relabeling support, skipping Dec 13 04:02:15.729125 ignition[771]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 04:02:15.730144 ignition[771]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 04:02:15.738567 ignition[771]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 04:02:15.739356 ignition[771]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 04:02:15.740695 unknown[771]: wrote ssh authorized keys file for user: core Dec 13 04:02:15.741380 ignition[771]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 04:02:15.742135 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 04:02:15.744259 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 04:02:15.815205 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 04:02:16.211736 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 04:02:16.211736 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 04:02:16.216519 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 04:02:16.257454 systemd-networkd[619]: eth0: Gained IPv6LL Dec 13 04:02:16.766178 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 04:02:18.359704 ignition[771]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 04:02:18.359704 ignition[771]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 04:02:18.359704 ignition[771]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 04:02:18.359704 ignition[771]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 04:02:18.369277 ignition[771]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 04:02:18.390126 kernel: audit: type=1130 audit(1734062538.375:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.372751 systemd[1]: Finished ignition-files.service. Dec 13 04:02:18.391738 ignition[771]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 04:02:18.391738 ignition[771]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 04:02:18.391738 ignition[771]: INFO : files: files passed Dec 13 04:02:18.391738 ignition[771]: INFO : Ignition finished successfully Dec 13 04:02:18.376459 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 04:02:18.388013 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 04:02:18.397673 initrd-setup-root-after-ignition[795]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 04:02:18.389680 systemd[1]: Starting ignition-quench.service... Dec 13 04:02:18.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.398043 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 04:02:18.398290 systemd[1]: Finished ignition-quench.service. Dec 13 04:02:18.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.400437 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 04:02:18.402214 systemd[1]: Reached target ignition-complete.target. Dec 13 04:02:18.405062 systemd[1]: Starting initrd-parse-etc.service... Dec 13 04:02:18.424711 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 04:02:18.426426 systemd[1]: Finished initrd-parse-etc.service. Dec 13 04:02:18.428326 systemd[1]: Reached target initrd-fs.target. Dec 13 04:02:18.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.428843 systemd[1]: Reached target initrd.target. Dec 13 04:02:18.430380 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 04:02:18.431269 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 04:02:18.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.454432 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 04:02:18.455703 systemd[1]: Starting initrd-cleanup.service... Dec 13 04:02:18.471590 systemd[1]: Stopped target nss-lookup.target. Dec 13 04:02:18.472659 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 04:02:18.473712 systemd[1]: Stopped target timers.target. Dec 13 04:02:18.474710 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 04:02:18.475374 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 04:02:18.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.476558 systemd[1]: Stopped target initrd.target. Dec 13 04:02:18.477530 systemd[1]: Stopped target basic.target. Dec 13 04:02:18.478537 systemd[1]: Stopped target ignition-complete.target. Dec 13 04:02:18.479667 systemd[1]: Stopped target ignition-diskful.target. Dec 13 04:02:18.480757 systemd[1]: Stopped target initrd-root-device.target. Dec 13 04:02:18.481805 systemd[1]: Stopped target remote-fs.target. Dec 13 04:02:18.482819 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 04:02:18.483843 systemd[1]: Stopped target sysinit.target. Dec 13 04:02:18.484845 systemd[1]: Stopped target local-fs.target. Dec 13 04:02:18.485834 systemd[1]: Stopped target local-fs-pre.target. Dec 13 04:02:18.486851 systemd[1]: Stopped target swap.target. Dec 13 04:02:18.487784 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 04:02:18.488454 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 04:02:18.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.489626 systemd[1]: Stopped target cryptsetup.target. Dec 13 04:02:18.490599 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 04:02:18.491259 systemd[1]: Stopped dracut-initqueue.service. Dec 13 04:02:18.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.492385 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 04:02:18.493191 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 04:02:18.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.494354 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 04:02:18.494998 systemd[1]: Stopped ignition-files.service. Dec 13 04:02:18.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.496870 systemd[1]: Stopping ignition-mount.service... Dec 13 04:02:18.501131 iscsid[628]: iscsid shutting down. Dec 13 04:02:18.503546 systemd[1]: Stopping iscsid.service... Dec 13 04:02:18.505311 systemd[1]: Stopping sysroot-boot.service... Dec 13 04:02:18.506269 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 04:02:18.507060 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 04:02:18.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.508188 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 04:02:18.508876 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 04:02:18.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.511626 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 04:02:18.512303 systemd[1]: Stopped iscsid.service. Dec 13 04:02:18.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.514567 systemd[1]: Stopping iscsiuio.service... Dec 13 04:02:18.516159 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 04:02:18.516783 systemd[1]: Finished initrd-cleanup.service. Dec 13 04:02:18.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.520746 ignition[809]: INFO : Ignition 2.14.0 Dec 13 04:02:18.520746 ignition[809]: INFO : Stage: umount Dec 13 04:02:18.520746 ignition[809]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 04:02:18.520746 ignition[809]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 04:02:18.528334 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 04:02:18.529350 ignition[809]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 04:02:18.528430 systemd[1]: Stopped iscsiuio.service. Dec 13 04:02:18.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.531551 ignition[809]: INFO : umount: umount passed Dec 13 04:02:18.531551 ignition[809]: INFO : Ignition finished successfully Dec 13 04:02:18.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.533323 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 04:02:18.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.533407 systemd[1]: Stopped ignition-mount.service. Dec 13 04:02:18.533886 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 04:02:18.533925 systemd[1]: Stopped ignition-disks.service. Dec 13 04:02:18.534396 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 04:02:18.534443 systemd[1]: Stopped ignition-kargs.service. Dec 13 04:02:18.535017 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 04:02:18.535056 systemd[1]: Stopped ignition-fetch.service. Dec 13 04:02:18.535632 systemd[1]: Stopped target network.target. Dec 13 04:02:18.536030 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 04:02:18.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.536069 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 04:02:18.537215 systemd[1]: Stopped target paths.target. Dec 13 04:02:18.538185 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 04:02:18.542221 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 04:02:18.543043 systemd[1]: Stopped target slices.target. Dec 13 04:02:18.543465 systemd[1]: Stopped target sockets.target. Dec 13 04:02:18.543895 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 04:02:18.543928 systemd[1]: Closed iscsid.socket. Dec 13 04:02:18.552000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.544352 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 04:02:18.544380 systemd[1]: Closed iscsiuio.socket. Dec 13 04:02:18.544760 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 04:02:18.555000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.544796 systemd[1]: Stopped ignition-setup.service. Dec 13 04:02:18.558000 audit: BPF prog-id=6 op=UNLOAD Dec 13 04:02:18.545622 systemd[1]: Stopping systemd-networkd.service... Dec 13 04:02:18.546163 systemd[1]: Stopping systemd-resolved.service... Dec 13 04:02:18.549936 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 04:02:18.550294 systemd-networkd[619]: eth0: DHCPv6 lease lost Dec 13 04:02:18.561000 audit: BPF prog-id=9 op=UNLOAD Dec 13 04:02:18.551820 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 04:02:18.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.551925 systemd[1]: Stopped systemd-resolved.service. Dec 13 04:02:18.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.555295 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 04:02:18.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.555391 systemd[1]: Stopped systemd-networkd.service. Dec 13 04:02:18.557026 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 04:02:18.557057 systemd[1]: Closed systemd-networkd.socket. Dec 13 04:02:18.559646 systemd[1]: Stopping network-cleanup.service... Dec 13 04:02:18.561880 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 04:02:18.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.561932 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 04:02:18.562890 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 04:02:18.562933 systemd[1]: Stopped systemd-sysctl.service. Dec 13 04:02:18.564302 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 04:02:18.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.564351 systemd[1]: Stopped systemd-modules-load.service. Dec 13 04:02:18.568639 systemd[1]: Stopping systemd-udevd.service... Dec 13 04:02:18.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.570414 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 04:02:18.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.570995 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 04:02:18.583000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.571071 systemd[1]: Stopped sysroot-boot.service. Dec 13 04:02:18.572699 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 04:02:18.572746 systemd[1]: Stopped initrd-setup-root.service. Dec 13 04:02:18.576372 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 04:02:18.576476 systemd[1]: Stopped network-cleanup.service. Dec 13 04:02:18.577298 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 04:02:18.577419 systemd[1]: Stopped systemd-udevd.service. Dec 13 04:02:18.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.578654 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 04:02:18.578698 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 04:02:18.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.579217 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 04:02:18.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.579248 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 04:02:18.579739 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 04:02:18.579780 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 04:02:18.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:18.580685 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 04:02:18.580723 systemd[1]: Stopped dracut-cmdline.service. Dec 13 04:02:18.582308 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 04:02:18.582393 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 04:02:18.584361 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 04:02:18.584929 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 04:02:18.584980 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 04:02:18.589689 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 04:02:18.589730 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 04:02:18.591307 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 04:02:18.591371 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 04:02:18.592953 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 04:02:18.593524 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 04:02:18.593623 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 04:02:18.594386 systemd[1]: Reached target initrd-switch-root.target. Dec 13 04:02:18.595807 systemd[1]: Starting initrd-switch-root.service... Dec 13 04:02:18.615559 systemd[1]: Switching root. Dec 13 04:02:18.634862 systemd-journald[186]: Journal stopped Dec 13 04:02:24.920567 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). Dec 13 04:02:24.920634 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 04:02:24.920649 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 04:02:24.920666 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 04:02:24.920677 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 04:02:24.920692 kernel: SELinux: policy capability open_perms=1 Dec 13 04:02:24.920703 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 04:02:24.920714 kernel: SELinux: policy capability always_check_network=0 Dec 13 04:02:24.920733 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 04:02:24.920744 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 04:02:24.920755 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 04:02:24.920766 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 04:02:24.920777 systemd[1]: Successfully loaded SELinux policy in 94.846ms. Dec 13 04:02:24.920806 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 22.723ms. Dec 13 04:02:24.920820 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 04:02:24.920833 systemd[1]: Detected virtualization kvm. Dec 13 04:02:24.920846 systemd[1]: Detected architecture x86-64. Dec 13 04:02:24.920862 systemd[1]: Detected first boot. Dec 13 04:02:24.920874 systemd[1]: Hostname set to . Dec 13 04:02:24.920886 systemd[1]: Initializing machine ID from VM UUID. Dec 13 04:02:24.920898 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 04:02:24.920910 systemd[1]: Populated /etc with preset unit settings. Dec 13 04:02:24.920923 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 04:02:24.920938 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 04:02:24.920951 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 04:02:24.920964 kernel: kauditd_printk_skb: 58 callbacks suppressed Dec 13 04:02:24.920975 kernel: audit: type=1334 audit(1734062544.626:90): prog-id=12 op=LOAD Dec 13 04:02:24.920987 kernel: audit: type=1334 audit(1734062544.626:91): prog-id=3 op=UNLOAD Dec 13 04:02:24.920998 kernel: audit: type=1334 audit(1734062544.629:92): prog-id=13 op=LOAD Dec 13 04:02:24.921008 kernel: audit: type=1334 audit(1734062544.635:93): prog-id=14 op=LOAD Dec 13 04:02:24.921021 kernel: audit: type=1334 audit(1734062544.635:94): prog-id=4 op=UNLOAD Dec 13 04:02:24.921032 kernel: audit: type=1334 audit(1734062544.635:95): prog-id=5 op=UNLOAD Dec 13 04:02:24.921043 kernel: audit: type=1334 audit(1734062544.638:96): prog-id=15 op=LOAD Dec 13 04:02:24.921054 kernel: audit: type=1334 audit(1734062544.638:97): prog-id=12 op=UNLOAD Dec 13 04:02:24.921065 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 04:02:24.921076 kernel: audit: type=1334 audit(1734062544.644:98): prog-id=16 op=LOAD Dec 13 04:02:24.921087 kernel: audit: type=1334 audit(1734062544.647:99): prog-id=17 op=LOAD Dec 13 04:02:24.921098 systemd[1]: Stopped initrd-switch-root.service. Dec 13 04:02:24.921110 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 04:02:24.923916 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 04:02:24.923933 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 04:02:24.923946 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 04:02:24.923959 systemd[1]: Created slice system-getty.slice. Dec 13 04:02:24.923977 systemd[1]: Created slice system-modprobe.slice. Dec 13 04:02:24.924012 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 04:02:24.924041 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 04:02:24.924061 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 04:02:24.924082 systemd[1]: Created slice user.slice. Dec 13 04:02:24.924104 systemd[1]: Started systemd-ask-password-console.path. Dec 13 04:02:24.924169 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 04:02:24.924196 systemd[1]: Set up automount boot.automount. Dec 13 04:02:24.924218 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 04:02:24.924238 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 04:02:24.924258 systemd[1]: Stopped target initrd-fs.target. Dec 13 04:02:24.924283 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 04:02:24.924305 systemd[1]: Reached target integritysetup.target. Dec 13 04:02:24.924329 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 04:02:24.924351 systemd[1]: Reached target remote-fs.target. Dec 13 04:02:24.924371 systemd[1]: Reached target slices.target. Dec 13 04:02:24.924396 systemd[1]: Reached target swap.target. Dec 13 04:02:24.924417 systemd[1]: Reached target torcx.target. Dec 13 04:02:24.924436 systemd[1]: Reached target veritysetup.target. Dec 13 04:02:24.924455 systemd[1]: Listening on systemd-coredump.socket. Dec 13 04:02:24.924481 systemd[1]: Listening on systemd-initctl.socket. Dec 13 04:02:24.924502 systemd[1]: Listening on systemd-networkd.socket. Dec 13 04:02:24.924523 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 04:02:24.924544 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 04:02:24.924565 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 04:02:24.924585 systemd[1]: Mounting dev-hugepages.mount... Dec 13 04:02:24.924606 systemd[1]: Mounting dev-mqueue.mount... Dec 13 04:02:24.924627 systemd[1]: Mounting media.mount... Dec 13 04:02:24.924648 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:24.924669 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 04:02:24.924694 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 04:02:24.924715 systemd[1]: Mounting tmp.mount... Dec 13 04:02:24.924736 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 04:02:24.924757 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 04:02:24.924779 systemd[1]: Starting kmod-static-nodes.service... Dec 13 04:02:24.924800 systemd[1]: Starting modprobe@configfs.service... Dec 13 04:02:24.924820 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 04:02:24.924842 systemd[1]: Starting modprobe@drm.service... Dec 13 04:02:24.924862 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 04:02:24.924887 systemd[1]: Starting modprobe@fuse.service... Dec 13 04:02:24.924908 systemd[1]: Starting modprobe@loop.service... Dec 13 04:02:24.924931 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 04:02:24.924953 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 04:02:24.924974 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 04:02:24.924993 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 04:02:24.925013 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 04:02:24.925034 systemd[1]: Stopped systemd-journald.service. Dec 13 04:02:24.925055 systemd[1]: Starting systemd-journald.service... Dec 13 04:02:24.925075 systemd[1]: Starting systemd-modules-load.service... Dec 13 04:02:24.925095 kernel: loop: module loaded Dec 13 04:02:24.925111 systemd[1]: Starting systemd-network-generator.service... Dec 13 04:02:24.925157 systemd[1]: Starting systemd-remount-fs.service... Dec 13 04:02:24.925171 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 04:02:24.925183 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 04:02:24.925196 systemd[1]: Stopped verity-setup.service. Dec 13 04:02:24.925209 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:24.925222 systemd[1]: Mounted dev-hugepages.mount. Dec 13 04:02:24.925238 systemd[1]: Mounted dev-mqueue.mount. Dec 13 04:02:24.925250 systemd[1]: Mounted media.mount. Dec 13 04:02:24.925263 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 04:02:24.925275 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 04:02:24.925287 systemd[1]: Mounted tmp.mount. Dec 13 04:02:24.925299 systemd[1]: Finished kmod-static-nodes.service. Dec 13 04:02:24.925311 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 04:02:24.925324 systemd[1]: Finished modprobe@configfs.service. Dec 13 04:02:24.925336 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 04:02:24.925351 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 04:02:24.925363 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 04:02:24.925376 systemd[1]: Finished modprobe@drm.service. Dec 13 04:02:24.925388 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 04:02:24.925400 kernel: fuse: init (API version 7.34) Dec 13 04:02:24.925414 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 04:02:24.925428 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 04:02:24.925440 systemd[1]: Finished modprobe@loop.service. Dec 13 04:02:24.925454 systemd[1]: Finished systemd-modules-load.service. Dec 13 04:02:24.925467 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 04:02:24.925482 systemd[1]: Finished modprobe@fuse.service. Dec 13 04:02:24.925494 systemd[1]: Finished systemd-network-generator.service. Dec 13 04:02:24.925507 systemd[1]: Finished systemd-remount-fs.service. Dec 13 04:02:24.925520 systemd[1]: Reached target network-pre.target. Dec 13 04:02:24.925532 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 04:02:24.925546 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 04:02:24.925562 systemd-journald[916]: Journal started Dec 13 04:02:24.925614 systemd-journald[916]: Runtime Journal (/run/log/journal/085277f8fc85461a90bbd18f1cbe8024) is 4.9M, max 39.5M, 34.5M free. Dec 13 04:02:18.968000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 04:02:19.114000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 04:02:19.114000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 04:02:19.115000 audit: BPF prog-id=10 op=LOAD Dec 13 04:02:19.115000 audit: BPF prog-id=10 op=UNLOAD Dec 13 04:02:19.115000 audit: BPF prog-id=11 op=LOAD Dec 13 04:02:19.115000 audit: BPF prog-id=11 op=UNLOAD Dec 13 04:02:19.320000 audit[842]: AVC avc: denied { associate } for pid=842 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 04:02:19.320000 audit[842]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cede0 a2=c0000d70c0 a3=32 items=0 ppid=825 pid=842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:19.320000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 04:02:19.322000 audit[842]: AVC avc: denied { associate } for pid=842 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 04:02:19.322000 audit[842]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=825 pid=842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:19.322000 audit: CWD cwd="/" Dec 13 04:02:19.322000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:19.322000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:19.322000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 04:02:24.626000 audit: BPF prog-id=12 op=LOAD Dec 13 04:02:24.626000 audit: BPF prog-id=3 op=UNLOAD Dec 13 04:02:24.629000 audit: BPF prog-id=13 op=LOAD Dec 13 04:02:24.635000 audit: BPF prog-id=14 op=LOAD Dec 13 04:02:24.635000 audit: BPF prog-id=4 op=UNLOAD Dec 13 04:02:24.635000 audit: BPF prog-id=5 op=UNLOAD Dec 13 04:02:24.638000 audit: BPF prog-id=15 op=LOAD Dec 13 04:02:24.638000 audit: BPF prog-id=12 op=UNLOAD Dec 13 04:02:24.644000 audit: BPF prog-id=16 op=LOAD Dec 13 04:02:24.647000 audit: BPF prog-id=17 op=LOAD Dec 13 04:02:24.647000 audit: BPF prog-id=13 op=UNLOAD Dec 13 04:02:24.647000 audit: BPF prog-id=14 op=UNLOAD Dec 13 04:02:24.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.678000 audit: BPF prog-id=15 op=UNLOAD Dec 13 04:02:24.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.828000 audit: BPF prog-id=18 op=LOAD Dec 13 04:02:24.831000 audit: BPF prog-id=19 op=LOAD Dec 13 04:02:24.831000 audit: BPF prog-id=20 op=LOAD Dec 13 04:02:24.831000 audit: BPF prog-id=16 op=UNLOAD Dec 13 04:02:24.831000 audit: BPF prog-id=17 op=UNLOAD Dec 13 04:02:24.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.875000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.915000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 04:02:24.915000 audit[916]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffd218db3f0 a2=4000 a3=7ffd218db48c items=0 ppid=1 pid=916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:24.915000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 04:02:24.625232 systemd[1]: Queued start job for default target multi-user.target. Dec 13 04:02:24.937314 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 04:02:24.937349 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 04:02:24.937376 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 04:02:19.315827 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 04:02:24.625245 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 04:02:19.316929 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 04:02:24.648062 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 04:02:19.316956 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 04:02:19.316993 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 04:02:19.317005 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 04:02:19.317038 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 04:02:24.950341 systemd[1]: Starting systemd-random-seed.service... Dec 13 04:02:24.950389 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 04:02:19.317053 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 04:02:19.317298 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 04:02:19.317340 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 04:02:19.317355 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 04:02:19.319722 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 04:02:19.319762 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 04:02:19.319783 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 04:02:19.319800 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 04:02:19.319820 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 04:02:19.319836 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 04:02:23.690460 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 04:02:23.690764 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 04:02:23.690883 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 04:02:23.691092 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 04:02:23.691177 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 04:02:23.691257 /usr/lib/systemd/system-generators/torcx-generator[842]: time="2024-12-13T04:02:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 04:02:24.960837 systemd[1]: Starting systemd-sysctl.service... Dec 13 04:02:24.960916 systemd[1]: Started systemd-journald.service. Dec 13 04:02:24.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.965273 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 04:02:24.965808 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 04:02:24.967637 systemd[1]: Starting systemd-journal-flush.service... Dec 13 04:02:24.977938 systemd-journald[916]: Time spent on flushing to /var/log/journal/085277f8fc85461a90bbd18f1cbe8024 is 17.349ms for 1108 entries. Dec 13 04:02:24.977938 systemd-journald[916]: System Journal (/var/log/journal/085277f8fc85461a90bbd18f1cbe8024) is 8.0M, max 584.8M, 576.8M free. Dec 13 04:02:25.072572 systemd-journald[916]: Received client request to flush runtime journal. Dec 13 04:02:24.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:25.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:25.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:24.980626 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 04:02:25.077458 udevadm[946]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 04:02:24.982494 systemd[1]: Starting systemd-udev-settle.service... Dec 13 04:02:24.986178 systemd[1]: Finished systemd-sysctl.service. Dec 13 04:02:24.990549 systemd[1]: Finished systemd-random-seed.service. Dec 13 04:02:24.991144 systemd[1]: Reached target first-boot-complete.target. Dec 13 04:02:25.000074 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 04:02:25.001919 systemd[1]: Starting systemd-sysusers.service... Dec 13 04:02:25.074498 systemd[1]: Finished systemd-journal-flush.service. Dec 13 04:02:25.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:25.091526 systemd[1]: Finished systemd-sysusers.service. Dec 13 04:02:25.095028 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 04:02:25.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:25.202269 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 04:02:25.817623 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 04:02:25.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:25.820000 audit: BPF prog-id=21 op=LOAD Dec 13 04:02:25.820000 audit: BPF prog-id=22 op=LOAD Dec 13 04:02:25.820000 audit: BPF prog-id=7 op=UNLOAD Dec 13 04:02:25.820000 audit: BPF prog-id=8 op=UNLOAD Dec 13 04:02:25.822000 systemd[1]: Starting systemd-udevd.service... Dec 13 04:02:25.865018 systemd-udevd[956]: Using default interface naming scheme 'v252'. Dec 13 04:02:26.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:26.279000 audit: BPF prog-id=23 op=LOAD Dec 13 04:02:26.272983 systemd[1]: Started systemd-udevd.service. Dec 13 04:02:26.283488 systemd[1]: Starting systemd-networkd.service... Dec 13 04:02:26.306000 audit: BPF prog-id=24 op=LOAD Dec 13 04:02:26.306000 audit: BPF prog-id=25 op=LOAD Dec 13 04:02:26.306000 audit: BPF prog-id=26 op=LOAD Dec 13 04:02:26.308586 systemd[1]: Starting systemd-userdbd.service... Dec 13 04:02:26.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:26.364141 systemd[1]: Started systemd-userdbd.service. Dec 13 04:02:26.383313 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 04:02:26.456380 systemd-networkd[966]: lo: Link UP Dec 13 04:02:26.456391 systemd-networkd[966]: lo: Gained carrier Dec 13 04:02:26.457356 systemd-networkd[966]: Enumeration completed Dec 13 04:02:26.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:26.457454 systemd[1]: Started systemd-networkd.service. Dec 13 04:02:26.457667 systemd-networkd[966]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 04:02:26.459507 systemd-networkd[966]: eth0: Link UP Dec 13 04:02:26.459518 systemd-networkd[966]: eth0: Gained carrier Dec 13 04:02:26.466154 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 04:02:26.470484 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 04:02:26.472350 systemd-networkd[966]: eth0: DHCPv4 address 172.24.4.161/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 04:02:26.477149 kernel: ACPI: button: Power Button [PWRF] Dec 13 04:02:26.501000 audit[967]: AVC avc: denied { confidentiality } for pid=967 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 04:02:26.501000 audit[967]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=557e346fd0e0 a1=337fc a2=7fbb56321bc5 a3=5 items=110 ppid=956 pid=967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:26.501000 audit: CWD cwd="/" Dec 13 04:02:26.501000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=1 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=2 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=3 name=(null) inode=14007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=4 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=5 name=(null) inode=14008 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=6 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=7 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=8 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=9 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=10 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=11 name=(null) inode=14011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=12 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=13 name=(null) inode=14012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=14 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=15 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=16 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=17 name=(null) inode=14014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=18 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=19 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=20 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=21 name=(null) inode=14016 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=22 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=23 name=(null) inode=14017 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=24 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=25 name=(null) inode=14018 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=26 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=27 name=(null) inode=14019 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=28 name=(null) inode=14015 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=29 name=(null) inode=14020 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=30 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=31 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=32 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=33 name=(null) inode=14022 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=34 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=35 name=(null) inode=14023 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=36 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=37 name=(null) inode=14024 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=38 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=39 name=(null) inode=14025 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=40 name=(null) inode=14021 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=41 name=(null) inode=14026 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=42 name=(null) inode=14006 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=43 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=44 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=45 name=(null) inode=14028 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=46 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=47 name=(null) inode=14029 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=48 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=49 name=(null) inode=14030 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=50 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=51 name=(null) inode=14031 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=52 name=(null) inode=14027 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=53 name=(null) inode=14032 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=55 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=56 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=57 name=(null) inode=14034 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=58 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=59 name=(null) inode=14035 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=60 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=61 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=62 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=63 name=(null) inode=14037 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=64 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=65 name=(null) inode=14038 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=66 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=67 name=(null) inode=14039 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=68 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=69 name=(null) inode=14040 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=70 name=(null) inode=14036 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=71 name=(null) inode=14041 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=72 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=73 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=74 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=75 name=(null) inode=14043 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=76 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=77 name=(null) inode=14044 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=78 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=79 name=(null) inode=14045 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=80 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=81 name=(null) inode=14046 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=82 name=(null) inode=14042 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=83 name=(null) inode=14047 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=84 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=85 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=86 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=87 name=(null) inode=14049 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=88 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=89 name=(null) inode=14050 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=90 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=91 name=(null) inode=14051 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=92 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=93 name=(null) inode=14052 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=94 name=(null) inode=14048 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=95 name=(null) inode=14053 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=96 name=(null) inode=14033 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=97 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=98 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=99 name=(null) inode=14055 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=100 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=101 name=(null) inode=14056 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=102 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=103 name=(null) inode=14057 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=104 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=105 name=(null) inode=14058 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=106 name=(null) inode=14054 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=107 name=(null) inode=14059 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PATH item=109 name=(null) inode=14060 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:02:26.501000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 04:02:26.523270 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 04:02:26.529159 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 04:02:26.537156 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 04:02:26.578756 systemd[1]: Finished systemd-udev-settle.service. Dec 13 04:02:26.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:26.580655 systemd[1]: Starting lvm2-activation-early.service... Dec 13 04:02:26.954398 lvm[985]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 04:02:27.004347 systemd[1]: Finished lvm2-activation-early.service. Dec 13 04:02:27.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:27.005749 systemd[1]: Reached target cryptsetup.target. Dec 13 04:02:27.009329 systemd[1]: Starting lvm2-activation.service... Dec 13 04:02:27.018765 lvm[986]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 04:02:27.057178 systemd[1]: Finished lvm2-activation.service. Dec 13 04:02:27.058000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:27.058609 systemd[1]: Reached target local-fs-pre.target. Dec 13 04:02:27.059753 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 04:02:27.059817 systemd[1]: Reached target local-fs.target. Dec 13 04:02:27.060952 systemd[1]: Reached target machines.target. Dec 13 04:02:27.064829 systemd[1]: Starting ldconfig.service... Dec 13 04:02:27.067385 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 04:02:27.067554 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:27.070335 systemd[1]: Starting systemd-boot-update.service... Dec 13 04:02:27.074797 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 04:02:27.081490 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 04:02:27.088184 systemd[1]: Starting systemd-sysext.service... Dec 13 04:02:27.109817 systemd[1]: boot.automount: Got automount request for /boot, triggered by 988 (bootctl) Dec 13 04:02:27.112803 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 04:02:27.133916 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 04:02:27.183427 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 04:02:27.183828 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 04:02:27.237238 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 04:02:27.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:27.244171 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 04:02:28.214308 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 04:02:28.216804 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 04:02:28.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.225528 systemd-networkd[966]: eth0: Gained IPv6LL Dec 13 04:02:28.262185 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 04:02:28.305306 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 04:02:28.355502 systemd-fsck[1000]: fsck.fat 4.2 (2021-01-31) Dec 13 04:02:28.355502 systemd-fsck[1000]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 04:02:28.355460 (sd-sysext)[1004]: Using extensions 'kubernetes'. Dec 13 04:02:28.357878 (sd-sysext)[1004]: Merged extensions into '/usr'. Dec 13 04:02:28.362811 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 04:02:28.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.367683 systemd[1]: Mounting boot.mount... Dec 13 04:02:28.410094 systemd[1]: Mounted boot.mount. Dec 13 04:02:28.414247 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.415780 systemd[1]: Mounting usr-share-oem.mount... Dec 13 04:02:28.419824 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.422073 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 04:02:28.424542 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 04:02:28.427366 systemd[1]: Starting modprobe@loop.service... Dec 13 04:02:28.427970 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.428162 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:28.428310 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.432794 systemd[1]: Mounted usr-share-oem.mount. Dec 13 04:02:28.434098 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 04:02:28.434281 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 04:02:28.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.435311 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 04:02:28.435429 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 04:02:28.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.436000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.436637 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 04:02:28.442042 systemd[1]: Finished systemd-sysext.service. Dec 13 04:02:28.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.443897 systemd[1]: Starting ensure-sysext.service... Dec 13 04:02:28.446092 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 04:02:28.452102 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 04:02:28.452322 systemd[1]: Finished modprobe@loop.service. Dec 13 04:02:28.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.454984 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.456251 systemd[1]: Reloading. Dec 13 04:02:28.489277 systemd-tmpfiles[1012]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 04:02:28.496879 systemd-tmpfiles[1012]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 04:02:28.502662 systemd-tmpfiles[1012]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 04:02:28.538356 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T04:02:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 04:02:28.538394 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T04:02:28Z" level=info msg="torcx already run" Dec 13 04:02:28.704655 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 04:02:28.704686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 04:02:28.740668 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 04:02:28.805000 audit: BPF prog-id=27 op=LOAD Dec 13 04:02:28.805000 audit: BPF prog-id=23 op=UNLOAD Dec 13 04:02:28.806000 audit: BPF prog-id=28 op=LOAD Dec 13 04:02:28.806000 audit: BPF prog-id=24 op=UNLOAD Dec 13 04:02:28.806000 audit: BPF prog-id=29 op=LOAD Dec 13 04:02:28.806000 audit: BPF prog-id=30 op=LOAD Dec 13 04:02:28.806000 audit: BPF prog-id=25 op=UNLOAD Dec 13 04:02:28.806000 audit: BPF prog-id=26 op=UNLOAD Dec 13 04:02:28.807000 audit: BPF prog-id=31 op=LOAD Dec 13 04:02:28.807000 audit: BPF prog-id=18 op=UNLOAD Dec 13 04:02:28.807000 audit: BPF prog-id=32 op=LOAD Dec 13 04:02:28.807000 audit: BPF prog-id=33 op=LOAD Dec 13 04:02:28.807000 audit: BPF prog-id=19 op=UNLOAD Dec 13 04:02:28.807000 audit: BPF prog-id=20 op=UNLOAD Dec 13 04:02:28.810000 audit: BPF prog-id=34 op=LOAD Dec 13 04:02:28.811000 audit: BPF prog-id=35 op=LOAD Dec 13 04:02:28.811000 audit: BPF prog-id=21 op=UNLOAD Dec 13 04:02:28.811000 audit: BPF prog-id=22 op=UNLOAD Dec 13 04:02:28.813500 systemd[1]: Finished systemd-boot-update.service. Dec 13 04:02:28.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.830679 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.830922 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.832737 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 04:02:28.836765 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 04:02:28.838642 systemd[1]: Starting modprobe@loop.service... Dec 13 04:02:28.840849 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.840990 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:28.841111 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.842061 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 04:02:28.842379 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 04:02:28.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.843436 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 04:02:28.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.843549 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 04:02:28.844557 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 04:02:28.844667 systemd[1]: Finished modprobe@loop.service. Dec 13 04:02:28.852047 systemd[1]: Finished ensure-sysext.service. Dec 13 04:02:28.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.853624 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.853832 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.855034 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 04:02:28.860629 systemd[1]: Starting modprobe@drm.service... Dec 13 04:02:28.867328 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 04:02:28.872989 systemd[1]: Starting modprobe@loop.service... Dec 13 04:02:28.875252 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.875346 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:28.878206 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 04:02:28.879713 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 04:02:28.880558 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 04:02:28.880738 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 04:02:28.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.881000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.881758 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 04:02:28.881904 systemd[1]: Finished modprobe@drm.service. Dec 13 04:02:28.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.882000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.882747 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 04:02:28.882895 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 04:02:28.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:28.883693 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 04:02:28.883824 systemd[1]: Finished modprobe@loop.service. Dec 13 04:02:28.884596 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 04:02:28.884636 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 04:02:28.898212 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 04:02:28.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.091691 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 04:02:29.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.096439 systemd[1]: Starting audit-rules.service... Dec 13 04:02:29.101260 systemd[1]: Starting clean-ca-certificates.service... Dec 13 04:02:29.106650 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 04:02:29.111000 audit: BPF prog-id=36 op=LOAD Dec 13 04:02:29.113994 systemd[1]: Starting systemd-resolved.service... Dec 13 04:02:29.117000 audit: BPF prog-id=37 op=LOAD Dec 13 04:02:29.120799 systemd[1]: Starting systemd-timesyncd.service... Dec 13 04:02:29.124523 systemd[1]: Starting systemd-update-utmp.service... Dec 13 04:02:29.209000 audit[1094]: SYSTEM_BOOT pid=1094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.213132 systemd[1]: Finished systemd-update-utmp.service. Dec 13 04:02:29.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.231015 systemd[1]: Finished clean-ca-certificates.service. Dec 13 04:02:29.231000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.231908 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 04:02:29.238189 systemd[1]: Started systemd-timesyncd.service. Dec 13 04:02:29.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.238825 systemd[1]: Reached target time-set.target. Dec 13 04:02:29.250996 systemd-resolved[1092]: Positive Trust Anchors: Dec 13 04:02:29.251031 systemd-resolved[1092]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 04:02:29.251180 systemd-resolved[1092]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 04:02:29.289541 systemd-resolved[1092]: Using system hostname 'ci-3510-3-6-b-9ccf4f3b90.novalocal'. Dec 13 04:02:29.293221 systemd[1]: Started systemd-resolved.service. Dec 13 04:02:29.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.294584 systemd[1]: Reached target network.target. Dec 13 04:02:29.295668 systemd[1]: Reached target network-online.target. Dec 13 04:02:29.705967 systemd-timesyncd[1093]: Contacted time server 194.57.169.1:123 (0.flatcar.pool.ntp.org). Dec 13 04:02:29.706031 systemd-timesyncd[1093]: Initial clock synchronization to Fri 2024-12-13 04:02:29.705834 UTC. Dec 13 04:02:29.706079 systemd-resolved[1092]: Clock change detected. Flushing caches. Dec 13 04:02:29.706416 systemd[1]: Reached target nss-lookup.target. Dec 13 04:02:29.791899 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 04:02:29.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:29.837000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 04:02:29.837000 audit[1109]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffab7a3190 a2=420 a3=0 items=0 ppid=1088 pid=1109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:29.837000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 04:02:29.840165 augenrules[1109]: No rules Dec 13 04:02:29.842668 systemd[1]: Finished audit-rules.service. Dec 13 04:02:29.951191 ldconfig[987]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 04:02:29.972036 systemd[1]: Finished ldconfig.service. Dec 13 04:02:29.976322 systemd[1]: Starting systemd-update-done.service... Dec 13 04:02:29.992808 systemd[1]: Finished systemd-update-done.service. Dec 13 04:02:29.994193 systemd[1]: Reached target sysinit.target. Dec 13 04:02:29.995585 systemd[1]: Started motdgen.path. Dec 13 04:02:29.996730 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 04:02:29.998491 systemd[1]: Started logrotate.timer. Dec 13 04:02:29.999807 systemd[1]: Started mdadm.timer. Dec 13 04:02:30.000873 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 04:02:30.002039 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 04:02:30.002114 systemd[1]: Reached target paths.target. Dec 13 04:02:30.003216 systemd[1]: Reached target timers.target. Dec 13 04:02:30.005473 systemd[1]: Listening on dbus.socket. Dec 13 04:02:30.008948 systemd[1]: Starting docker.socket... Dec 13 04:02:30.016992 systemd[1]: Listening on sshd.socket. Dec 13 04:02:30.018471 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:30.019652 systemd[1]: Listening on docker.socket. Dec 13 04:02:30.021184 systemd[1]: Reached target sockets.target. Dec 13 04:02:30.022452 systemd[1]: Reached target basic.target. Dec 13 04:02:30.023751 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 04:02:30.024055 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 04:02:30.026728 systemd[1]: Starting containerd.service... Dec 13 04:02:30.031755 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 04:02:30.036662 systemd[1]: Starting dbus.service... Dec 13 04:02:30.042918 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 04:02:30.051387 systemd[1]: Starting extend-filesystems.service... Dec 13 04:02:30.057219 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 04:02:30.064746 systemd[1]: Starting kubelet.service... Dec 13 04:02:30.072614 systemd[1]: Starting motdgen.service... Dec 13 04:02:30.081176 systemd[1]: Starting prepare-helm.service... Dec 13 04:02:30.089383 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 04:02:30.091489 systemd[1]: Starting sshd-keygen.service... Dec 13 04:02:30.098974 systemd[1]: Starting systemd-logind.service... Dec 13 04:02:30.099539 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 04:02:30.099622 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 04:02:30.100302 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 04:02:30.101289 systemd[1]: Starting update-engine.service... Dec 13 04:02:30.103900 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 04:02:30.116328 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 04:02:30.116550 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 04:02:30.121187 jq[1138]: true Dec 13 04:02:30.132886 jq[1122]: false Dec 13 04:02:30.139967 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 04:02:30.140245 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 04:02:30.145490 tar[1143]: linux-amd64/helm Dec 13 04:02:30.151402 jq[1145]: true Dec 13 04:02:30.161552 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 04:02:30.161819 systemd[1]: Finished motdgen.service. Dec 13 04:02:30.167471 extend-filesystems[1123]: Found loop1 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda1 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda2 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda3 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found usr Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda4 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda6 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda7 Dec 13 04:02:30.167471 extend-filesystems[1123]: Found vda9 Dec 13 04:02:30.167471 extend-filesystems[1123]: Checking size of /dev/vda9 Dec 13 04:02:30.217915 extend-filesystems[1123]: Resized partition /dev/vda9 Dec 13 04:02:30.236310 extend-filesystems[1172]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 04:02:30.272654 env[1147]: time="2024-12-13T04:02:30.272592302Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 04:02:30.313861 systemd-logind[1136]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 04:02:30.313891 systemd-logind[1136]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 04:02:30.315550 systemd-logind[1136]: New seat seat0. Dec 13 04:02:30.327379 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 04:02:30.332038 dbus-daemon[1121]: [system] SELinux support is enabled Dec 13 04:02:30.342139 dbus-daemon[1121]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 04:02:30.347285 env[1147]: time="2024-12-13T04:02:30.333570246Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 04:02:30.332262 systemd[1]: Started dbus.service. Dec 13 04:02:30.334599 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 04:02:30.334623 systemd[1]: Reached target system-config.target. Dec 13 04:02:30.335098 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 04:02:30.335117 systemd[1]: Reached target user-config.target. Dec 13 04:02:30.340585 systemd[1]: Started systemd-logind.service. Dec 13 04:02:30.348057 env[1147]: time="2024-12-13T04:02:30.348010359Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.349831 env[1147]: time="2024-12-13T04:02:30.349797891Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 04:02:30.349909 env[1147]: time="2024-12-13T04:02:30.349891837Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.350190 env[1147]: time="2024-12-13T04:02:30.350167124Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 04:02:30.353476 env[1147]: time="2024-12-13T04:02:30.353456623Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.353565 env[1147]: time="2024-12-13T04:02:30.353547564Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 04:02:30.353637 env[1147]: time="2024-12-13T04:02:30.353621632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.353871 env[1147]: time="2024-12-13T04:02:30.353851684Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.354276 env[1147]: time="2024-12-13T04:02:30.354255642Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 04:02:30.354490 env[1147]: time="2024-12-13T04:02:30.354467809Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 04:02:30.354563 env[1147]: time="2024-12-13T04:02:30.354547950Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 04:02:30.354674 env[1147]: time="2024-12-13T04:02:30.354655461Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 04:02:30.354750 env[1147]: time="2024-12-13T04:02:30.354735241Z" level=info msg="metadata content store policy set" policy=shared Dec 13 04:02:30.384831 update_engine[1137]: I1213 04:02:30.382912 1137 main.cc:92] Flatcar Update Engine starting Dec 13 04:02:30.497261 update_engine[1137]: I1213 04:02:30.391886 1137 update_check_scheduler.cc:74] Next update check in 5m57s Dec 13 04:02:30.391880 systemd[1]: Started update-engine.service. Dec 13 04:02:30.395490 systemd[1]: Started locksmithd.service. Dec 13 04:02:30.544805 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 04:02:30.901375 bash[1176]: Updated "/home/core/.ssh/authorized_keys" Dec 13 04:02:30.583320 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 04:02:30.907166 extend-filesystems[1172]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 04:02:30.907166 extend-filesystems[1172]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 04:02:30.907166 extend-filesystems[1172]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 04:02:30.817748 locksmithd[1190]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923645763Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923711075Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923727296Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923861928Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923889369Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923958910Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923976603Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.923995228Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924013312Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924029132Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924044991Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924059328Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924253262Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 04:02:30.925310 env[1147]: time="2024-12-13T04:02:30.924363389Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 04:02:30.926977 extend-filesystems[1123]: Resized filesystem in /dev/vda9 Dec 13 04:02:30.909176 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924779910Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924812030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924827900Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924891759Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924909693Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924924972Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.924999381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925025600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925048594Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925070304Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925092847Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925120529Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925262344Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925281921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.929044 env[1147]: time="2024-12-13T04:02:30.925296899Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.909560 systemd[1]: Finished extend-filesystems.service. Dec 13 04:02:30.930834 env[1147]: time="2024-12-13T04:02:30.925312188Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 04:02:30.930834 env[1147]: time="2024-12-13T04:02:30.925331294Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 04:02:30.930834 env[1147]: time="2024-12-13T04:02:30.925345651Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 04:02:30.930834 env[1147]: time="2024-12-13T04:02:30.925370838Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 04:02:30.930834 env[1147]: time="2024-12-13T04:02:30.925414460Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 04:02:30.931222 env[1147]: time="2024-12-13T04:02:30.925639732Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 04:02:30.931222 env[1147]: time="2024-12-13T04:02:30.925707970Z" level=info msg="Connect containerd service" Dec 13 04:02:30.931222 env[1147]: time="2024-12-13T04:02:30.925737335Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.932579057Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933113730Z" level=info msg="Start subscribing containerd event" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933176127Z" level=info msg="Start recovering state" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933245186Z" level=info msg="Start event monitor" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933267909Z" level=info msg="Start snapshots syncer" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933279531Z" level=info msg="Start cni network conf syncer for default" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933288618Z" level=info msg="Start streaming server" Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.933999150Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.934479151Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 04:02:31.019678 env[1147]: time="2024-12-13T04:02:30.936960114Z" level=info msg="containerd successfully booted in 0.665120s" Dec 13 04:02:30.937130 systemd[1]: Started containerd.service. Dec 13 04:02:31.279090 sshd_keygen[1151]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 04:02:31.330275 systemd[1]: Finished sshd-keygen.service. Dec 13 04:02:31.332564 systemd[1]: Starting issuegen.service... Dec 13 04:02:31.341727 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 04:02:31.341909 systemd[1]: Finished issuegen.service. Dec 13 04:02:31.344038 systemd[1]: Starting systemd-user-sessions.service... Dec 13 04:02:31.354074 tar[1143]: linux-amd64/LICENSE Dec 13 04:02:31.354356 tar[1143]: linux-amd64/README.md Dec 13 04:02:31.358956 systemd[1]: Finished prepare-helm.service. Dec 13 04:02:31.404225 systemd[1]: Finished systemd-user-sessions.service. Dec 13 04:02:31.407402 systemd[1]: Started getty@tty1.service. Dec 13 04:02:31.410635 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 04:02:31.418450 systemd[1]: Reached target getty.target. Dec 13 04:02:34.676699 systemd[1]: Started kubelet.service. Dec 13 04:02:36.679364 kubelet[1215]: E1213 04:02:36.679285 1215 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 04:02:36.683554 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 04:02:36.683932 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 04:02:36.684589 systemd[1]: kubelet.service: Consumed 2.173s CPU time. Dec 13 04:02:37.239379 coreos-metadata[1118]: Dec 13 04:02:37.239 WARN failed to locate config-drive, using the metadata service API instead Dec 13 04:02:37.344470 coreos-metadata[1118]: Dec 13 04:02:37.344 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 04:02:37.654624 coreos-metadata[1118]: Dec 13 04:02:37.654 INFO Fetch successful Dec 13 04:02:37.654624 coreos-metadata[1118]: Dec 13 04:02:37.654 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 04:02:37.671281 coreos-metadata[1118]: Dec 13 04:02:37.671 INFO Fetch successful Dec 13 04:02:37.676198 unknown[1118]: wrote ssh authorized keys file for user: core Dec 13 04:02:37.704220 update-ssh-keys[1223]: Updated "/home/core/.ssh/authorized_keys" Dec 13 04:02:37.705903 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 04:02:37.706872 systemd[1]: Reached target multi-user.target. Dec 13 04:02:37.709664 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 04:02:37.728096 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 04:02:37.728431 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 04:02:37.729570 systemd[1]: Startup finished in 904ms (kernel) + 8.158s (initrd) + 18.471s (userspace) = 27.534s. Dec 13 04:02:39.218378 systemd[1]: Created slice system-sshd.slice. Dec 13 04:02:39.221695 systemd[1]: Started sshd@0-172.24.4.161:22-172.24.4.1:51006.service. Dec 13 04:02:40.659690 sshd[1226]: Accepted publickey for core from 172.24.4.1 port 51006 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:40.664702 sshd[1226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:40.695491 systemd-logind[1136]: New session 1 of user core. Dec 13 04:02:40.699889 systemd[1]: Created slice user-500.slice. Dec 13 04:02:40.703032 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 04:02:40.727201 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 04:02:40.733303 systemd[1]: Starting user@500.service... Dec 13 04:02:40.742338 (systemd)[1229]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:40.875055 systemd[1229]: Queued start job for default target default.target. Dec 13 04:02:40.876128 systemd[1229]: Reached target paths.target. Dec 13 04:02:40.876182 systemd[1229]: Reached target sockets.target. Dec 13 04:02:40.876212 systemd[1229]: Reached target timers.target. Dec 13 04:02:40.876228 systemd[1229]: Reached target basic.target. Dec 13 04:02:40.876275 systemd[1229]: Reached target default.target. Dec 13 04:02:40.876301 systemd[1229]: Startup finished in 119ms. Dec 13 04:02:40.877376 systemd[1]: Started user@500.service. Dec 13 04:02:40.880632 systemd[1]: Started session-1.scope. Dec 13 04:02:41.459110 systemd[1]: Started sshd@1-172.24.4.161:22-172.24.4.1:51010.service. Dec 13 04:02:42.909069 sshd[1238]: Accepted publickey for core from 172.24.4.1 port 51010 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:42.912667 sshd[1238]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:42.923915 systemd-logind[1136]: New session 2 of user core. Dec 13 04:02:42.925243 systemd[1]: Started session-2.scope. Dec 13 04:02:43.530091 sshd[1238]: pam_unix(sshd:session): session closed for user core Dec 13 04:02:43.538219 systemd[1]: Started sshd@2-172.24.4.161:22-172.24.4.1:51022.service. Dec 13 04:02:43.539427 systemd[1]: sshd@1-172.24.4.161:22-172.24.4.1:51010.service: Deactivated successfully. Dec 13 04:02:43.542318 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 04:02:43.544810 systemd-logind[1136]: Session 2 logged out. Waiting for processes to exit. Dec 13 04:02:43.546970 systemd-logind[1136]: Removed session 2. Dec 13 04:02:44.885560 sshd[1243]: Accepted publickey for core from 172.24.4.1 port 51022 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:44.890747 sshd[1243]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:44.901584 systemd[1]: Started session-3.scope. Dec 13 04:02:44.903925 systemd-logind[1136]: New session 3 of user core. Dec 13 04:02:45.528317 sshd[1243]: pam_unix(sshd:session): session closed for user core Dec 13 04:02:45.535977 systemd[1]: Started sshd@3-172.24.4.161:22-172.24.4.1:42238.service. Dec 13 04:02:45.537219 systemd[1]: sshd@2-172.24.4.161:22-172.24.4.1:51022.service: Deactivated successfully. Dec 13 04:02:45.540390 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 04:02:45.542670 systemd-logind[1136]: Session 3 logged out. Waiting for processes to exit. Dec 13 04:02:45.545170 systemd-logind[1136]: Removed session 3. Dec 13 04:02:46.899410 sshd[1249]: Accepted publickey for core from 172.24.4.1 port 42238 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:46.902670 sshd[1249]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:46.905046 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 04:02:46.905602 systemd[1]: Stopped kubelet.service. Dec 13 04:02:46.905674 systemd[1]: kubelet.service: Consumed 2.173s CPU time. Dec 13 04:02:46.908421 systemd[1]: Starting kubelet.service... Dec 13 04:02:46.919917 systemd-logind[1136]: New session 4 of user core. Dec 13 04:02:46.920126 systemd[1]: Started session-4.scope. Dec 13 04:02:47.266624 systemd[1]: Started kubelet.service. Dec 13 04:02:47.649103 kubelet[1257]: E1213 04:02:47.648309 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 04:02:47.655015 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 04:02:47.655394 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 04:02:47.683578 sshd[1249]: pam_unix(sshd:session): session closed for user core Dec 13 04:02:47.692004 systemd[1]: sshd@3-172.24.4.161:22-172.24.4.1:42238.service: Deactivated successfully. Dec 13 04:02:47.693340 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 04:02:47.694861 systemd-logind[1136]: Session 4 logged out. Waiting for processes to exit. Dec 13 04:02:47.697313 systemd[1]: Started sshd@4-172.24.4.161:22-172.24.4.1:42246.service. Dec 13 04:02:47.701365 systemd-logind[1136]: Removed session 4. Dec 13 04:02:49.179481 sshd[1265]: Accepted publickey for core from 172.24.4.1 port 42246 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:49.183209 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:49.191720 systemd[1]: Started session-5.scope. Dec 13 04:02:49.192614 systemd-logind[1136]: New session 5 of user core. Dec 13 04:02:49.680460 sudo[1268]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 04:02:49.681224 sudo[1268]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 04:02:49.689991 dbus-daemon[1121]: н9\u0019,V: received setenforce notice (enforcing=534528960) Dec 13 04:02:49.693499 sudo[1268]: pam_unix(sudo:session): session closed for user root Dec 13 04:02:49.902014 sshd[1265]: pam_unix(sshd:session): session closed for user core Dec 13 04:02:49.907147 systemd[1]: Started sshd@5-172.24.4.161:22-172.24.4.1:42250.service. Dec 13 04:02:49.912870 systemd[1]: sshd@4-172.24.4.161:22-172.24.4.1:42246.service: Deactivated successfully. Dec 13 04:02:49.914437 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 04:02:49.918171 systemd-logind[1136]: Session 5 logged out. Waiting for processes to exit. Dec 13 04:02:49.919936 systemd-logind[1136]: Removed session 5. Dec 13 04:02:51.389193 sshd[1271]: Accepted publickey for core from 172.24.4.1 port 42250 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:51.393953 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:51.405316 systemd-logind[1136]: New session 6 of user core. Dec 13 04:02:51.406215 systemd[1]: Started session-6.scope. Dec 13 04:02:51.855008 sudo[1276]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 04:02:51.856295 sudo[1276]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 04:02:51.862650 sudo[1276]: pam_unix(sudo:session): session closed for user root Dec 13 04:02:51.872232 sudo[1275]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 04:02:51.872728 sudo[1275]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 04:02:51.890856 systemd[1]: Stopping audit-rules.service... Dec 13 04:02:51.890000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 04:02:51.894951 kernel: kauditd_printk_skb: 229 callbacks suppressed Dec 13 04:02:51.895096 kernel: audit: type=1305 audit(1734062571.890:212): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 04:02:51.895475 auditctl[1279]: No rules Dec 13 04:02:51.896429 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 04:02:51.896831 systemd[1]: Stopped audit-rules.service. Dec 13 04:02:51.901139 systemd[1]: Starting audit-rules.service... Dec 13 04:02:51.890000 audit[1279]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd595e0560 a2=420 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:51.915817 kernel: audit: type=1300 audit(1734062571.890:212): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd595e0560 a2=420 a3=0 items=0 ppid=1 pid=1279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:51.890000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 04:02:51.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.929837 kernel: audit: type=1327 audit(1734062571.890:212): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 04:02:51.929934 kernel: audit: type=1131 audit(1734062571.895:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.946186 augenrules[1296]: No rules Dec 13 04:02:51.947448 systemd[1]: Finished audit-rules.service. Dec 13 04:02:51.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.948715 sudo[1275]: pam_unix(sudo:session): session closed for user root Dec 13 04:02:51.952954 kernel: audit: type=1130 audit(1734062571.945:214): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.946000 audit[1275]: USER_END pid=1275 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.946000 audit[1275]: CRED_DISP pid=1275 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.961867 kernel: audit: type=1106 audit(1734062571.946:215): pid=1275 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:51.961950 kernel: audit: type=1104 audit(1734062571.946:216): pid=1275 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:52.138657 sshd[1271]: pam_unix(sshd:session): session closed for user core Dec 13 04:02:52.146205 systemd[1]: Started sshd@6-172.24.4.161:22-172.24.4.1:42252.service. Dec 13 04:02:52.142000 audit[1271]: USER_END pid=1271 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:52.153588 systemd[1]: sshd@5-172.24.4.161:22-172.24.4.1:42250.service: Deactivated successfully. Dec 13 04:02:52.155325 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 04:02:52.161934 kernel: audit: type=1106 audit(1734062572.142:217): pid=1271 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:52.143000 audit[1271]: CRED_DISP pid=1271 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:52.174823 kernel: audit: type=1104 audit(1734062572.143:218): pid=1271 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:52.174918 systemd-logind[1136]: Session 6 logged out. Waiting for processes to exit. Dec 13 04:02:52.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.161:22-172.24.4.1:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:52.151000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-172.24.4.161:22-172.24.4.1:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:52.187024 kernel: audit: type=1130 audit(1734062572.144:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.161:22-172.24.4.1:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:52.187996 systemd-logind[1136]: Removed session 6. Dec 13 04:02:53.495000 audit[1301]: USER_ACCT pid=1301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:53.497433 sshd[1301]: Accepted publickey for core from 172.24.4.1 port 42252 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:02:53.497000 audit[1301]: CRED_ACQ pid=1301 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:53.497000 audit[1301]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94088430 a2=3 a3=0 items=0 ppid=1 pid=1301 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:53.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:02:53.503439 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:02:53.513338 systemd-logind[1136]: New session 7 of user core. Dec 13 04:02:53.514213 systemd[1]: Started session-7.scope. Dec 13 04:02:53.525000 audit[1301]: USER_START pid=1301 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:53.528000 audit[1304]: CRED_ACQ pid=1304 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:02:53.919000 audit[1305]: USER_ACCT pid=1305 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:53.921969 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 04:02:53.920000 audit[1305]: CRED_REFR pid=1305 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:53.922619 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 04:02:53.925000 audit[1305]: USER_START pid=1305 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:02:53.980240 systemd[1]: Starting docker.service... Dec 13 04:02:54.065284 env[1315]: time="2024-12-13T04:02:54.065202286Z" level=info msg="Starting up" Dec 13 04:02:54.068463 env[1315]: time="2024-12-13T04:02:54.068378523Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 04:02:54.068463 env[1315]: time="2024-12-13T04:02:54.068414090Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 04:02:54.068463 env[1315]: time="2024-12-13T04:02:54.068440199Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 04:02:54.068463 env[1315]: time="2024-12-13T04:02:54.068453794Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 04:02:54.070718 env[1315]: time="2024-12-13T04:02:54.070616390Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 04:02:54.070718 env[1315]: time="2024-12-13T04:02:54.070637410Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 04:02:54.070718 env[1315]: time="2024-12-13T04:02:54.070652398Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 04:02:54.070718 env[1315]: time="2024-12-13T04:02:54.070662036Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 04:02:54.136718 env[1315]: time="2024-12-13T04:02:54.136667629Z" level=info msg="Loading containers: start." Dec 13 04:02:54.338000 audit[1345]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.338000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcf9043fb0 a2=0 a3=7ffcf9043f9c items=0 ppid=1315 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.338000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 04:02:54.344000 audit[1347]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.344000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc8ea480e0 a2=0 a3=7ffc8ea480cc items=0 ppid=1315 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.344000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 04:02:54.349000 audit[1349]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.349000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe7a57b420 a2=0 a3=7ffe7a57b40c items=0 ppid=1315 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.349000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 04:02:54.354000 audit[1351]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.354000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc7a0bedc0 a2=0 a3=7ffc7a0bedac items=0 ppid=1315 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.354000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 04:02:54.365000 audit[1353]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.365000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffecd63d680 a2=0 a3=7ffecd63d66c items=0 ppid=1315 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 04:02:54.398000 audit[1358]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.398000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe275afa00 a2=0 a3=7ffe275af9ec items=0 ppid=1315 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.398000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 04:02:54.418000 audit[1360]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.418000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd73f78c30 a2=0 a3=7ffd73f78c1c items=0 ppid=1315 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.418000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 04:02:54.424000 audit[1362]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.424000 audit[1362]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffa5e24340 a2=0 a3=7fffa5e2432c items=0 ppid=1315 pid=1362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.424000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 04:02:54.429000 audit[1364]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.429000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffee59e2e40 a2=0 a3=7ffee59e2e2c items=0 ppid=1315 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 04:02:54.450000 audit[1368]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.450000 audit[1368]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff698868d0 a2=0 a3=7fff698868bc items=0 ppid=1315 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.450000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 04:02:54.458000 audit[1369]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.458000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcae6af460 a2=0 a3=7ffcae6af44c items=0 ppid=1315 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 04:02:54.484897 kernel: Initializing XFRM netlink socket Dec 13 04:02:54.571853 env[1315]: time="2024-12-13T04:02:54.571811341Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 04:02:54.685000 audit[1378]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.685000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe0906d8b0 a2=0 a3=7ffe0906d89c items=0 ppid=1315 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 04:02:54.726000 audit[1381]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.726000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc69e83260 a2=0 a3=7ffc69e8324c items=0 ppid=1315 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.726000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 04:02:54.737000 audit[1384]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.737000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdb9ac1830 a2=0 a3=7ffdb9ac181c items=0 ppid=1315 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.737000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 04:02:54.742000 audit[1386]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.742000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcbf60b840 a2=0 a3=7ffcbf60b82c items=0 ppid=1315 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 04:02:54.749000 audit[1388]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.749000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc778166e0 a2=0 a3=7ffc778166cc items=0 ppid=1315 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.749000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 04:02:54.755000 audit[1390]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.755000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd0b6e59c0 a2=0 a3=7ffd0b6e59ac items=0 ppid=1315 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.755000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 04:02:54.760000 audit[1392]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.760000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffda6967710 a2=0 a3=7ffda69676fc items=0 ppid=1315 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.760000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 04:02:54.821000 audit[1395]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.821000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff8551a270 a2=0 a3=7fff8551a25c items=0 ppid=1315 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.821000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 04:02:54.827000 audit[1397]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.827000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffcd9cb4410 a2=0 a3=7ffcd9cb43fc items=0 ppid=1315 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.827000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 04:02:54.832000 audit[1399]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.832000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffcb422b670 a2=0 a3=7ffcb422b65c items=0 ppid=1315 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.832000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 04:02:54.838000 audit[1401]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.838000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fffdc3e2210 a2=0 a3=7fffdc3e21fc items=0 ppid=1315 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.838000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 04:02:54.841134 systemd-networkd[966]: docker0: Link UP Dec 13 04:02:54.875000 audit[1405]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.875000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed713f250 a2=0 a3=7ffed713f23c items=0 ppid=1315 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 04:02:54.883000 audit[1406]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:02:54.883000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd94fc3dc0 a2=0 a3=7ffd94fc3dac items=0 ppid=1315 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:02:54.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 04:02:54.886286 env[1315]: time="2024-12-13T04:02:54.886184438Z" level=info msg="Loading containers: done." Dec 13 04:02:54.936933 env[1315]: time="2024-12-13T04:02:54.936737961Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 04:02:54.937828 env[1315]: time="2024-12-13T04:02:54.937730482Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 04:02:54.938214 env[1315]: time="2024-12-13T04:02:54.938156802Z" level=info msg="Daemon has completed initialization" Dec 13 04:02:54.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:54.979076 systemd[1]: Started docker.service. Dec 13 04:02:55.007387 env[1315]: time="2024-12-13T04:02:55.007256689Z" level=info msg="API listen on /run/docker.sock" Dec 13 04:02:57.250288 env[1147]: time="2024-12-13T04:02:57.250139104Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 04:02:57.743638 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 04:02:57.754861 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 04:02:57.755027 kernel: audit: type=1130 audit(1734062577.742:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.744218 systemd[1]: Stopped kubelet.service. Dec 13 04:02:57.747720 systemd[1]: Starting kubelet.service... Dec 13 04:02:57.764881 kernel: audit: type=1131 audit(1734062577.742:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.911533 systemd[1]: Started kubelet.service. Dec 13 04:02:57.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.915926 kernel: audit: type=1130 audit(1734062577.909:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:02:57.962699 kubelet[1441]: E1213 04:02:57.962612 1441 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 04:02:57.964758 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 04:02:57.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:02:57.964921 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 04:02:57.969838 kernel: audit: type=1131 audit(1734062577.963:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:02:58.614356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount663379346.mount: Deactivated successfully. Dec 13 04:03:01.036184 env[1147]: time="2024-12-13T04:03:01.036067883Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:01.041250 env[1147]: time="2024-12-13T04:03:01.041195900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:01.052365 env[1147]: time="2024-12-13T04:03:01.052108467Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:01.059357 env[1147]: time="2024-12-13T04:03:01.059263436Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:01.059669 env[1147]: time="2024-12-13T04:03:01.059631436Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 04:03:01.201733 env[1147]: time="2024-12-13T04:03:01.201652186Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 04:03:04.213221 env[1147]: time="2024-12-13T04:03:04.213044493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:04.215586 env[1147]: time="2024-12-13T04:03:04.215504023Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:04.219038 env[1147]: time="2024-12-13T04:03:04.219013596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:04.224060 env[1147]: time="2024-12-13T04:03:04.224032785Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:04.224535 env[1147]: time="2024-12-13T04:03:04.224507496Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 04:03:04.227716 env[1147]: time="2024-12-13T04:03:04.227682273Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 04:03:06.296174 env[1147]: time="2024-12-13T04:03:06.296008467Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:06.299111 env[1147]: time="2024-12-13T04:03:06.299050404Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:06.302921 env[1147]: time="2024-12-13T04:03:06.302876317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:06.307214 env[1147]: time="2024-12-13T04:03:06.307160799Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:06.308168 env[1147]: time="2024-12-13T04:03:06.308117934Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 04:03:06.309483 env[1147]: time="2024-12-13T04:03:06.309438256Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 04:03:07.993283 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 04:03:08.001140 kernel: audit: type=1130 audit(1734062587.991:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:08.001216 kernel: audit: type=1131 audit(1734062587.991:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:07.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:07.991000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:07.993594 systemd[1]: Stopped kubelet.service. Dec 13 04:03:07.995892 systemd[1]: Starting kubelet.service... Dec 13 04:03:08.636437 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2891133475.mount: Deactivated successfully. Dec 13 04:03:08.737445 systemd[1]: Started kubelet.service. Dec 13 04:03:08.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:08.749829 kernel: audit: type=1130 audit(1734062588.736:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:08.818019 kubelet[1452]: E1213 04:03:08.817963 1452 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 04:03:08.819976 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 04:03:08.820184 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 04:03:08.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:03:08.824823 kernel: audit: type=1131 audit(1734062588.818:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:03:10.147680 env[1147]: time="2024-12-13T04:03:10.147576214Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:10.173435 env[1147]: time="2024-12-13T04:03:10.173365034Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:10.177922 env[1147]: time="2024-12-13T04:03:10.177851759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:10.190095 env[1147]: time="2024-12-13T04:03:10.190029900Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:10.192692 env[1147]: time="2024-12-13T04:03:10.192615769Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 04:03:10.194069 env[1147]: time="2024-12-13T04:03:10.194009145Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 04:03:11.181456 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3531792915.mount: Deactivated successfully. Dec 13 04:03:13.013596 env[1147]: time="2024-12-13T04:03:13.012740338Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.017469 env[1147]: time="2024-12-13T04:03:13.017368538Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.022411 env[1147]: time="2024-12-13T04:03:13.022339856Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.026727 env[1147]: time="2024-12-13T04:03:13.026674130Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.028943 env[1147]: time="2024-12-13T04:03:13.028884846Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 04:03:13.031488 env[1147]: time="2024-12-13T04:03:13.031437366Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 04:03:13.742999 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1761097254.mount: Deactivated successfully. Dec 13 04:03:13.934463 env[1147]: time="2024-12-13T04:03:13.934392643Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.970349 env[1147]: time="2024-12-13T04:03:13.970290201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.974690 env[1147]: time="2024-12-13T04:03:13.974636709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.977718 env[1147]: time="2024-12-13T04:03:13.977631183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:13.979337 env[1147]: time="2024-12-13T04:03:13.979248067Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 04:03:13.980374 env[1147]: time="2024-12-13T04:03:13.980321033Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 04:03:14.574016 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount357628633.mount: Deactivated successfully. Dec 13 04:03:15.215963 update_engine[1137]: I1213 04:03:15.215901 1137 update_attempter.cc:509] Updating boot flags... Dec 13 04:03:18.993744 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 04:03:19.013280 kernel: audit: type=1130 audit(1734062598.993:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:19.013443 kernel: audit: type=1131 audit(1734062598.993:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:18.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:18.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:18.993986 systemd[1]: Stopped kubelet.service. Dec 13 04:03:19.005976 systemd[1]: Starting kubelet.service... Dec 13 04:03:19.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:19.975039 systemd[1]: Started kubelet.service. Dec 13 04:03:19.983814 kernel: audit: type=1130 audit(1734062599.974:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:20.063799 kubelet[1475]: E1213 04:03:20.063702 1475 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 04:03:20.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:03:20.066962 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 04:03:20.067172 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 04:03:20.071852 kernel: audit: type=1131 audit(1734062600.066:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 04:03:20.488186 env[1147]: time="2024-12-13T04:03:20.488097428Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:20.525120 env[1147]: time="2024-12-13T04:03:20.524744581Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:20.535906 env[1147]: time="2024-12-13T04:03:20.535837968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:20.547983 env[1147]: time="2024-12-13T04:03:20.547903786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:20.550612 env[1147]: time="2024-12-13T04:03:20.550514144Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 04:03:25.350437 systemd[1]: Stopped kubelet.service. Dec 13 04:03:25.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:25.355527 systemd[1]: Starting kubelet.service... Dec 13 04:03:25.360823 kernel: audit: type=1130 audit(1734062605.350:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:25.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:25.365790 kernel: audit: type=1131 audit(1734062605.350:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:25.397403 systemd[1]: Reloading. Dec 13 04:03:25.497609 /usr/lib/systemd/system-generators/torcx-generator[1523]: time="2024-12-13T04:03:25Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 04:03:25.497985 /usr/lib/systemd/system-generators/torcx-generator[1523]: time="2024-12-13T04:03:25Z" level=info msg="torcx already run" Dec 13 04:03:26.024000 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 04:03:26.024169 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 04:03:26.046912 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 04:03:26.129388 kernel: audit: type=1400 audit(1734062606.121:268): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129498 kernel: audit: type=1400 audit(1734062606.121:269): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.138232 kernel: audit: type=1400 audit(1734062606.121:270): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.138438 kernel: audit: type=1400 audit(1734062606.121:271): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.142313 kernel: audit: type=1400 audit(1734062606.121:272): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146349 kernel: audit: type=1400 audit(1734062606.121:273): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.150210 kernel: audit: type=1400 audit(1734062606.121:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.154237 kernel: audit: type=1400 audit(1734062606.121:275): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit: BPF prog-id=43 op=LOAD Dec 13 04:03:26.129000 audit: BPF prog-id=41 op=UNLOAD Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.133000 audit: BPF prog-id=44 op=LOAD Dec 13 04:03:26.133000 audit: BPF prog-id=37 op=UNLOAD Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit: BPF prog-id=45 op=LOAD Dec 13 04:03:26.141000 audit: BPF prog-id=27 op=UNLOAD Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit: BPF prog-id=46 op=LOAD Dec 13 04:03:26.146000 audit: BPF prog-id=28 op=UNLOAD Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit: BPF prog-id=47 op=LOAD Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.149000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.154000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.154000 audit: BPF prog-id=48 op=LOAD Dec 13 04:03:26.154000 audit: BPF prog-id=29 op=UNLOAD Dec 13 04:03:26.154000 audit: BPF prog-id=30 op=UNLOAD Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit: BPF prog-id=49 op=LOAD Dec 13 04:03:26.157000 audit: BPF prog-id=31 op=UNLOAD Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.157000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit: BPF prog-id=50 op=LOAD Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.158000 audit: BPF prog-id=51 op=LOAD Dec 13 04:03:26.158000 audit: BPF prog-id=32 op=UNLOAD Dec 13 04:03:26.158000 audit: BPF prog-id=33 op=UNLOAD Dec 13 04:03:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.164000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.165000 audit: BPF prog-id=52 op=LOAD Dec 13 04:03:26.165000 audit: BPF prog-id=36 op=UNLOAD Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit: BPF prog-id=53 op=LOAD Dec 13 04:03:26.172000 audit: BPF prog-id=38 op=UNLOAD Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.172000 audit: BPF prog-id=54 op=LOAD Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.173000 audit: BPF prog-id=55 op=LOAD Dec 13 04:03:26.173000 audit: BPF prog-id=39 op=UNLOAD Dec 13 04:03:26.173000 audit: BPF prog-id=40 op=UNLOAD Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit: BPF prog-id=56 op=LOAD Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:26.179000 audit: BPF prog-id=57 op=LOAD Dec 13 04:03:26.179000 audit: BPF prog-id=34 op=UNLOAD Dec 13 04:03:26.179000 audit: BPF prog-id=35 op=UNLOAD Dec 13 04:03:26.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:26.201917 systemd[1]: Started kubelet.service. Dec 13 04:03:26.211334 systemd[1]: Stopping kubelet.service... Dec 13 04:03:26.212166 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 04:03:26.212389 systemd[1]: Stopped kubelet.service. Dec 13 04:03:26.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:26.214318 systemd[1]: Starting kubelet.service... Dec 13 04:03:26.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:26.333153 systemd[1]: Started kubelet.service. Dec 13 04:03:26.376426 kubelet[1582]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 04:03:26.377594 kubelet[1582]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 04:03:26.377734 kubelet[1582]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 04:03:26.822612 kubelet[1582]: I1213 04:03:26.822412 1582 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 04:03:27.241712 kubelet[1582]: I1213 04:03:27.241454 1582 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 04:03:27.241712 kubelet[1582]: I1213 04:03:27.241491 1582 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 04:03:27.242036 kubelet[1582]: I1213 04:03:27.242008 1582 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 04:03:27.314111 kubelet[1582]: I1213 04:03:27.314035 1582 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 04:03:27.314728 kubelet[1582]: E1213 04:03:27.314664 1582 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.24.4.161:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:27.336526 kubelet[1582]: E1213 04:03:27.336423 1582 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 04:03:27.336526 kubelet[1582]: I1213 04:03:27.336509 1582 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 04:03:27.348451 kubelet[1582]: I1213 04:03:27.348398 1582 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 04:03:27.348946 kubelet[1582]: I1213 04:03:27.348913 1582 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 04:03:27.349429 kubelet[1582]: I1213 04:03:27.349374 1582 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 04:03:27.350281 kubelet[1582]: I1213 04:03:27.349586 1582 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-b-9ccf4f3b90.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 04:03:27.350623 kubelet[1582]: I1213 04:03:27.350593 1582 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 04:03:27.350822 kubelet[1582]: I1213 04:03:27.350758 1582 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 04:03:27.351174 kubelet[1582]: I1213 04:03:27.351146 1582 state_mem.go:36] "Initialized new in-memory state store" Dec 13 04:03:27.374692 kubelet[1582]: I1213 04:03:27.374639 1582 kubelet.go:408] "Attempting to sync node with API server" Dec 13 04:03:27.375049 kubelet[1582]: I1213 04:03:27.375018 1582 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 04:03:27.375285 kubelet[1582]: I1213 04:03:27.375261 1582 kubelet.go:314] "Adding apiserver pod source" Dec 13 04:03:27.375458 kubelet[1582]: I1213 04:03:27.375433 1582 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 04:03:27.382950 kubelet[1582]: W1213 04:03:27.382702 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.161:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-b-9ccf4f3b90.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:27.383558 kubelet[1582]: E1213 04:03:27.382916 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.161:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-b-9ccf4f3b90.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:27.401951 kubelet[1582]: W1213 04:03:27.401744 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.161:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:27.402236 kubelet[1582]: E1213 04:03:27.401959 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.161:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:27.406028 kubelet[1582]: I1213 04:03:27.405987 1582 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 04:03:27.417499 kubelet[1582]: I1213 04:03:27.417449 1582 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 04:03:27.417900 kubelet[1582]: W1213 04:03:27.417870 1582 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 04:03:27.419296 kubelet[1582]: I1213 04:03:27.419263 1582 server.go:1269] "Started kubelet" Dec 13 04:03:27.419672 kubelet[1582]: I1213 04:03:27.419577 1582 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 04:03:27.422986 kubelet[1582]: I1213 04:03:27.422917 1582 server.go:460] "Adding debug handlers to kubelet server" Dec 13 04:03:27.428078 kubelet[1582]: I1213 04:03:27.427976 1582 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 04:03:27.428885 kubelet[1582]: I1213 04:03:27.428851 1582 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 04:03:27.433831 kubelet[1582]: E1213 04:03:27.430569 1582 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.161:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.161:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-b-9ccf4f3b90.novalocal.1810a0c105829cfc default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-b-9ccf4f3b90.novalocal,UID:ci-3510-3-6-b-9ccf4f3b90.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-b-9ccf4f3b90.novalocal,},FirstTimestamp:2024-12-13 04:03:27.419219196 +0000 UTC m=+1.082019166,LastTimestamp:2024-12-13 04:03:27.419219196 +0000 UTC m=+1.082019166,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-b-9ccf4f3b90.novalocal,}" Dec 13 04:03:27.433000 audit[1582]: AVC avc: denied { mac_admin } for pid=1582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:27.433000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:27.433000 audit[1582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00080f770 a1=c0004e0c60 a2=c00080f740 a3=25 items=0 ppid=1 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.433000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:27.434845 kubelet[1582]: I1213 04:03:27.434248 1582 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 04:03:27.434000 audit[1582]: AVC avc: denied { mac_admin } for pid=1582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:27.434000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:27.434000 audit[1582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b684c0 a1=c00014bf20 a2=c0009ff290 a3=25 items=0 ppid=1 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.434000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:27.435632 kubelet[1582]: I1213 04:03:27.435443 1582 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 04:03:27.436029 kubelet[1582]: I1213 04:03:27.435974 1582 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 04:03:27.441569 kubelet[1582]: I1213 04:03:27.441526 1582 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 04:03:27.442032 kubelet[1582]: I1213 04:03:27.436457 1582 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 04:03:27.442481 kubelet[1582]: I1213 04:03:27.442448 1582 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 04:03:27.442726 kubelet[1582]: I1213 04:03:27.442702 1582 reconciler.go:26] "Reconciler: start to sync state" Dec 13 04:03:27.444169 kubelet[1582]: W1213 04:03:27.444087 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.161:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:27.444460 kubelet[1582]: E1213 04:03:27.444420 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.161:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:27.445176 kubelet[1582]: E1213 04:03:27.445129 1582 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510-3-6-b-9ccf4f3b90.novalocal\" not found" Dec 13 04:03:27.445710 kubelet[1582]: E1213 04:03:27.445675 1582 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 04:03:27.449123 kubelet[1582]: I1213 04:03:27.449058 1582 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 04:03:27.449412 kubelet[1582]: E1213 04:03:27.449047 1582 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.161:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-b-9ccf4f3b90.novalocal?timeout=10s\": dial tcp 172.24.4.161:6443: connect: connection refused" interval="200ms" Dec 13 04:03:27.450000 audit[1592]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1592 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.450000 audit[1592]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdda6f19b0 a2=0 a3=7ffdda6f199c items=0 ppid=1582 pid=1592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.450000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 04:03:27.453224 kubelet[1582]: I1213 04:03:27.453192 1582 factory.go:221] Registration of the containerd container factory successfully Dec 13 04:03:27.453543 kubelet[1582]: I1213 04:03:27.453512 1582 factory.go:221] Registration of the systemd container factory successfully Dec 13 04:03:27.455000 audit[1594]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1594 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.455000 audit[1594]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeea8bfd20 a2=0 a3=7ffeea8bfd0c items=0 ppid=1582 pid=1594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.455000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 04:03:27.469000 audit[1598]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1598 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.469000 audit[1598]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffea2d54250 a2=0 a3=7ffea2d5423c items=0 ppid=1582 pid=1598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 04:03:27.471000 audit[1600]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1600 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.471000 audit[1600]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe6b9577d0 a2=0 a3=7ffe6b9577bc items=0 ppid=1582 pid=1600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 04:03:27.485000 audit[1604]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.485000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffe80a58370 a2=0 a3=7ffe80a5835c items=0 ppid=1582 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 04:03:27.486717 kubelet[1582]: I1213 04:03:27.486696 1582 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 04:03:27.486851 kubelet[1582]: I1213 04:03:27.486840 1582 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 04:03:27.486934 kubelet[1582]: I1213 04:03:27.486923 1582 state_mem.go:36] "Initialized new in-memory state store" Dec 13 04:03:27.487578 kubelet[1582]: I1213 04:03:27.487425 1582 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 04:03:27.488000 audit[1605]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:27.488000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffda8b43fb0 a2=0 a3=7ffda8b43f9c items=0 ppid=1582 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 04:03:27.489631 kubelet[1582]: I1213 04:03:27.489599 1582 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 04:03:27.490149 kubelet[1582]: I1213 04:03:27.490107 1582 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 04:03:27.490416 kubelet[1582]: I1213 04:03:27.490382 1582 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 04:03:27.490528 kubelet[1582]: E1213 04:03:27.490426 1582 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 04:03:27.497599 kubelet[1582]: W1213 04:03:27.491679 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.161:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:27.497599 kubelet[1582]: E1213 04:03:27.491746 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.161:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:27.499000 audit[1608]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:27.499000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc27842eb0 a2=0 a3=7ffc27842e9c items=0 ppid=1582 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 04:03:27.501000 audit[1607]: NETFILTER_CFG table=mangle:33 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.501000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff353a2590 a2=0 a3=7fff353a257c items=0 ppid=1582 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.501000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 04:03:27.502000 audit[1609]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:27.502000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe6d7af9c0 a2=0 a3=7ffe6d7af9ac items=0 ppid=1582 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 04:03:27.503000 audit[1611]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:27.503000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffe9335660 a2=0 a3=7fffe933564c items=0 ppid=1582 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 04:03:27.504000 audit[1610]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1610 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.504000 audit[1610]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffee44276c0 a2=0 a3=7ffee44276ac items=0 ppid=1582 pid=1610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.504000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 04:03:27.505000 audit[1612]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:27.505000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff027f2870 a2=0 a3=7fff027f285c items=0 ppid=1582 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 04:03:27.508603 kubelet[1582]: I1213 04:03:27.508584 1582 policy_none.go:49] "None policy: Start" Dec 13 04:03:27.509419 kubelet[1582]: I1213 04:03:27.509406 1582 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 04:03:27.509564 kubelet[1582]: I1213 04:03:27.509555 1582 state_mem.go:35] "Initializing new in-memory state store" Dec 13 04:03:27.518705 systemd[1]: Created slice kubepods.slice. Dec 13 04:03:27.523147 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 04:03:27.526164 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 04:03:27.531605 kubelet[1582]: I1213 04:03:27.531578 1582 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 04:03:27.530000 audit[1582]: AVC avc: denied { mac_admin } for pid=1582 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:27.530000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:27.530000 audit[1582]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000df4240 a1=c000b7fc68 a2=c000df4210 a3=25 items=0 ppid=1 pid=1582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:27.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:27.531919 kubelet[1582]: I1213 04:03:27.531676 1582 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 04:03:27.531919 kubelet[1582]: I1213 04:03:27.531830 1582 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 04:03:27.531919 kubelet[1582]: I1213 04:03:27.531842 1582 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 04:03:27.532480 kubelet[1582]: I1213 04:03:27.532466 1582 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 04:03:27.534964 kubelet[1582]: E1213 04:03:27.534948 1582 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-b-9ccf4f3b90.novalocal\" not found" Dec 13 04:03:27.610499 systemd[1]: Created slice kubepods-burstable-podc465661d3ba2c608bc615eac61414bd7.slice. Dec 13 04:03:27.625990 systemd[1]: Created slice kubepods-burstable-pod254fc6acc1c97a4807c9ebe862bea150.slice. Dec 13 04:03:27.635713 kubelet[1582]: I1213 04:03:27.635636 1582 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.636387 kubelet[1582]: E1213 04:03:27.636340 1582 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.161:6443/api/v1/nodes\": dial tcp 172.24.4.161:6443: connect: connection refused" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.642517 systemd[1]: Created slice kubepods-burstable-pod96b9bfa06a266b170a7cb53d31b99fe3.slice. Dec 13 04:03:27.644816 kubelet[1582]: I1213 04:03:27.644731 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.645465 kubelet[1582]: I1213 04:03:27.645222 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.645726 kubelet[1582]: I1213 04:03:27.645667 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.646009 kubelet[1582]: I1213 04:03:27.645944 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/254fc6acc1c97a4807c9ebe862bea150-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"254fc6acc1c97a4807c9ebe862bea150\") " pod="kube-system/kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.646476 kubelet[1582]: I1213 04:03:27.646410 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.646754 kubelet[1582]: I1213 04:03:27.646724 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.647029 kubelet[1582]: I1213 04:03:27.646958 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.647280 kubelet[1582]: I1213 04:03:27.647218 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.647559 kubelet[1582]: I1213 04:03:27.647489 1582 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.651149 kubelet[1582]: E1213 04:03:27.651097 1582 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.161:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-b-9ccf4f3b90.novalocal?timeout=10s\": dial tcp 172.24.4.161:6443: connect: connection refused" interval="400ms" Dec 13 04:03:27.843946 kubelet[1582]: I1213 04:03:27.840279 1582 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.844409 kubelet[1582]: E1213 04:03:27.844315 1582 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.161:6443/api/v1/nodes\": dial tcp 172.24.4.161:6443: connect: connection refused" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:27.923184 env[1147]: time="2024-12-13T04:03:27.923093130Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:c465661d3ba2c608bc615eac61414bd7,Namespace:kube-system,Attempt:0,}" Dec 13 04:03:27.941259 env[1147]: time="2024-12-13T04:03:27.940860016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:254fc6acc1c97a4807c9ebe862bea150,Namespace:kube-system,Attempt:0,}" Dec 13 04:03:27.948662 env[1147]: time="2024-12-13T04:03:27.948572661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:96b9bfa06a266b170a7cb53d31b99fe3,Namespace:kube-system,Attempt:0,}" Dec 13 04:03:28.052635 kubelet[1582]: E1213 04:03:28.052314 1582 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.161:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-b-9ccf4f3b90.novalocal?timeout=10s\": dial tcp 172.24.4.161:6443: connect: connection refused" interval="800ms" Dec 13 04:03:28.247828 kubelet[1582]: I1213 04:03:28.247703 1582 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:28.248723 kubelet[1582]: E1213 04:03:28.248631 1582 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.161:6443/api/v1/nodes\": dial tcp 172.24.4.161:6443: connect: connection refused" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:28.344846 kubelet[1582]: W1213 04:03:28.344568 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.161:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:28.344846 kubelet[1582]: E1213 04:03:28.344708 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://172.24.4.161:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:28.477088 kubelet[1582]: W1213 04:03:28.476941 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.161:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-b-9ccf4f3b90.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:28.477953 kubelet[1582]: E1213 04:03:28.477123 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://172.24.4.161:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-b-9ccf4f3b90.novalocal&limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:28.532755 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2303137537.mount: Deactivated successfully. Dec 13 04:03:28.554664 env[1147]: time="2024-12-13T04:03:28.554574614Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.560497 env[1147]: time="2024-12-13T04:03:28.560421909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.563656 env[1147]: time="2024-12-13T04:03:28.563622076Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.568722 env[1147]: time="2024-12-13T04:03:28.568643339Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.571020 env[1147]: time="2024-12-13T04:03:28.570994209Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.572262 env[1147]: time="2024-12-13T04:03:28.572179838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.574906 env[1147]: time="2024-12-13T04:03:28.574754170Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.576388 env[1147]: time="2024-12-13T04:03:28.576360290Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.583438 env[1147]: time="2024-12-13T04:03:28.583381763Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.589874 env[1147]: time="2024-12-13T04:03:28.589817044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.593065 env[1147]: time="2024-12-13T04:03:28.593014085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.594710 env[1147]: time="2024-12-13T04:03:28.594648759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:28.676493 env[1147]: time="2024-12-13T04:03:28.676295417Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:28.676493 env[1147]: time="2024-12-13T04:03:28.676438746Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:28.676787 env[1147]: time="2024-12-13T04:03:28.676729814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:28.693828 env[1147]: time="2024-12-13T04:03:28.693514445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/07cf9ccf1a7f4c85eb42885218dbcc83435379fe003a551083a5ce9ebb8b8a21 pid=1622 runtime=io.containerd.runc.v2 Dec 13 04:03:28.718853 env[1147]: time="2024-12-13T04:03:28.718629471Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:28.718853 env[1147]: time="2024-12-13T04:03:28.718674546Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:28.718853 env[1147]: time="2024-12-13T04:03:28.718689054Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:28.719296 env[1147]: time="2024-12-13T04:03:28.719205635Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e1f56f13b63477d4324c285d53b214012ab72eb9bf4bfd9ee38f5170c72bec79 pid=1644 runtime=io.containerd.runc.v2 Dec 13 04:03:28.721962 env[1147]: time="2024-12-13T04:03:28.719393278Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:28.721962 env[1147]: time="2024-12-13T04:03:28.721399480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:28.721962 env[1147]: time="2024-12-13T04:03:28.721415741Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:28.721962 env[1147]: time="2024-12-13T04:03:28.721883230Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/75bd568846d1a73717f176677aed58838b6810ecf7ec2a8c207160987734bc00 pid=1651 runtime=io.containerd.runc.v2 Dec 13 04:03:28.723708 systemd[1]: Started cri-containerd-07cf9ccf1a7f4c85eb42885218dbcc83435379fe003a551083a5ce9ebb8b8a21.scope. Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit: BPF prog-id=58 op=LOAD Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1622 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636639636366316137663463383565623432383835323138646263 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1622 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636639636366316137663463383565623432383835323138646263 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.743000 audit: BPF prog-id=59 op=LOAD Dec 13 04:03:28.743000 audit[1643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029bb10 items=0 ppid=1622 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.743000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636639636366316137663463383565623432383835323138646263 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit: BPF prog-id=60 op=LOAD Dec 13 04:03:28.744000 audit[1643]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029bb58 items=0 ppid=1622 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636639636366316137663463383565623432383835323138646263 Dec 13 04:03:28.744000 audit: BPF prog-id=60 op=UNLOAD Dec 13 04:03:28.744000 audit: BPF prog-id=59 op=UNLOAD Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { perfmon } for pid=1643 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit[1643]: AVC avc: denied { bpf } for pid=1643 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.744000 audit: BPF prog-id=61 op=LOAD Dec 13 04:03:28.744000 audit[1643]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029bf68 items=0 ppid=1622 pid=1643 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037636639636366316137663463383565623432383835323138646263 Dec 13 04:03:28.757926 systemd[1]: Started cri-containerd-75bd568846d1a73717f176677aed58838b6810ecf7ec2a8c207160987734bc00.scope. Dec 13 04:03:28.783263 systemd[1]: Started cri-containerd-e1f56f13b63477d4324c285d53b214012ab72eb9bf4bfd9ee38f5170c72bec79.scope. Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.787000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.788000 audit: BPF prog-id=62 op=LOAD Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1651 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626435363838343664316137333731376631373636373761656435 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=1651 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626435363838343664316137333731376631373636373761656435 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.789000 audit: BPF prog-id=63 op=LOAD Dec 13 04:03:28.789000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003ca6f0 items=0 ppid=1651 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626435363838343664316137333731376631373636373761656435 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.790000 audit: BPF prog-id=64 op=LOAD Dec 13 04:03:28.790000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003ca738 items=0 ppid=1651 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626435363838343664316137333731376631373636373761656435 Dec 13 04:03:28.793000 audit: BPF prog-id=64 op=UNLOAD Dec 13 04:03:28.793000 audit: BPF prog-id=63 op=UNLOAD Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { perfmon } for pid=1677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit[1677]: AVC avc: denied { bpf } for pid=1677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.794000 audit: BPF prog-id=65 op=LOAD Dec 13 04:03:28.794000 audit[1677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003cab48 items=0 ppid=1651 pid=1677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735626435363838343664316137333731376631373636373761656435 Dec 13 04:03:28.799845 kubelet[1582]: W1213 04:03:28.794696 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.161:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:28.799845 kubelet[1582]: E1213 04:03:28.794940 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://172.24.4.161:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:28.831898 env[1147]: time="2024-12-13T04:03:28.831847786Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:c465661d3ba2c608bc615eac61414bd7,Namespace:kube-system,Attempt:0,} returns sandbox id \"07cf9ccf1a7f4c85eb42885218dbcc83435379fe003a551083a5ce9ebb8b8a21\"" Dec 13 04:03:28.833053 kubelet[1582]: W1213 04:03:28.832971 1582 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.161:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 172.24.4.161:6443: connect: connection refused Dec 13 04:03:28.833186 kubelet[1582]: E1213 04:03:28.833060 1582 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://172.24.4.161:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.842000 audit: BPF prog-id=66 op=LOAD Dec 13 04:03:28.844820 env[1147]: time="2024-12-13T04:03:28.841984407Z" level=info msg="CreateContainer within sandbox \"07cf9ccf1a7f4c85eb42885218dbcc83435379fe003a551083a5ce9ebb8b8a21\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 04:03:28.844000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.844000 audit[1673]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1644 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663536663133623633343737643433323463323835643533623231 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1644 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663536663133623633343737643433323463323835643533623231 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.846000 audit: BPF prog-id=67 op=LOAD Dec 13 04:03:28.846000 audit[1673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00027edc0 items=0 ppid=1644 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663536663133623633343737643433323463323835643533623231 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.847000 audit: BPF prog-id=68 op=LOAD Dec 13 04:03:28.847000 audit[1673]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00027ee08 items=0 ppid=1644 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663536663133623633343737643433323463323835643533623231 Dec 13 04:03:28.848000 audit: BPF prog-id=68 op=UNLOAD Dec 13 04:03:28.848000 audit: BPF prog-id=67 op=UNLOAD Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { perfmon } for pid=1673 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit[1673]: AVC avc: denied { bpf } for pid=1673 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:28.848000 audit: BPF prog-id=69 op=LOAD Dec 13 04:03:28.848000 audit[1673]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00027f218 items=0 ppid=1644 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:28.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531663536663133623633343737643433323463323835643533623231 Dec 13 04:03:28.855311 kubelet[1582]: E1213 04:03:28.855256 1582 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.161:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-b-9ccf4f3b90.novalocal?timeout=10s\": dial tcp 172.24.4.161:6443: connect: connection refused" interval="1.6s" Dec 13 04:03:28.861576 env[1147]: time="2024-12-13T04:03:28.861535762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:96b9bfa06a266b170a7cb53d31b99fe3,Namespace:kube-system,Attempt:0,} returns sandbox id \"75bd568846d1a73717f176677aed58838b6810ecf7ec2a8c207160987734bc00\"" Dec 13 04:03:28.864359 env[1147]: time="2024-12-13T04:03:28.864324526Z" level=info msg="CreateContainer within sandbox \"75bd568846d1a73717f176677aed58838b6810ecf7ec2a8c207160987734bc00\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 04:03:28.891847 env[1147]: time="2024-12-13T04:03:28.891806532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal,Uid:254fc6acc1c97a4807c9ebe862bea150,Namespace:kube-system,Attempt:0,} returns sandbox id \"e1f56f13b63477d4324c285d53b214012ab72eb9bf4bfd9ee38f5170c72bec79\"" Dec 13 04:03:28.894972 env[1147]: time="2024-12-13T04:03:28.894932421Z" level=info msg="CreateContainer within sandbox \"e1f56f13b63477d4324c285d53b214012ab72eb9bf4bfd9ee38f5170c72bec79\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 04:03:28.953517 env[1147]: time="2024-12-13T04:03:28.953439887Z" level=info msg="CreateContainer within sandbox \"07cf9ccf1a7f4c85eb42885218dbcc83435379fe003a551083a5ce9ebb8b8a21\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"d57b7a3add1c5d52a3f1ecd9883ef1d45f382d2a99ceea391c1a3d5add445ef7\"" Dec 13 04:03:28.954414 env[1147]: time="2024-12-13T04:03:28.954369516Z" level=info msg="StartContainer for \"d57b7a3add1c5d52a3f1ecd9883ef1d45f382d2a99ceea391c1a3d5add445ef7\"" Dec 13 04:03:28.969504 env[1147]: time="2024-12-13T04:03:28.969443952Z" level=info msg="CreateContainer within sandbox \"75bd568846d1a73717f176677aed58838b6810ecf7ec2a8c207160987734bc00\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8316a6f8eb370cc9948b30b820755e8be284fb7b019b9d4a2dbba8e762f21c81\"" Dec 13 04:03:28.970482 env[1147]: time="2024-12-13T04:03:28.970432070Z" level=info msg="StartContainer for \"8316a6f8eb370cc9948b30b820755e8be284fb7b019b9d4a2dbba8e762f21c81\"" Dec 13 04:03:28.979410 systemd[1]: Started cri-containerd-d57b7a3add1c5d52a3f1ecd9883ef1d45f382d2a99ceea391c1a3d5add445ef7.scope. Dec 13 04:03:28.987059 env[1147]: time="2024-12-13T04:03:28.986423790Z" level=info msg="CreateContainer within sandbox \"e1f56f13b63477d4324c285d53b214012ab72eb9bf4bfd9ee38f5170c72bec79\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ccce6416cb2fc702d3f61ccf00f7914f0880a4ec2c7ac76b6cfe90073530d9c7\"" Dec 13 04:03:28.991133 env[1147]: time="2024-12-13T04:03:28.990367906Z" level=info msg="StartContainer for \"ccce6416cb2fc702d3f61ccf00f7914f0880a4ec2c7ac76b6cfe90073530d9c7\"" Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.002000 audit: BPF prog-id=70 op=LOAD Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1622 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237613361646431633564353261336631656364393838336566 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1622 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237613361646431633564353261336631656364393838336566 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit: BPF prog-id=71 op=LOAD Dec 13 04:03:29.004000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ca1e0 items=0 ppid=1622 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237613361646431633564353261336631656364393838336566 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.004000 audit: BPF prog-id=72 op=LOAD Dec 13 04:03:29.004000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003ca228 items=0 ppid=1622 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.004000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237613361646431633564353261336631656364393838336566 Dec 13 04:03:29.005000 audit: BPF prog-id=72 op=UNLOAD Dec 13 04:03:29.005000 audit: BPF prog-id=71 op=UNLOAD Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { perfmon } for pid=1747 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit[1747]: AVC avc: denied { bpf } for pid=1747 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.005000 audit: BPF prog-id=73 op=LOAD Dec 13 04:03:29.005000 audit[1747]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ca638 items=0 ppid=1622 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435376237613361646431633564353261336631656364393838336566 Dec 13 04:03:29.021645 systemd[1]: Started cri-containerd-8316a6f8eb370cc9948b30b820755e8be284fb7b019b9d4a2dbba8e762f21c81.scope. Dec 13 04:03:29.061866 kubelet[1582]: I1213 04:03:29.061726 1582 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:29.069807 kubelet[1582]: E1213 04:03:29.069009 1582 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://172.24.4.161:6443/api/v1/nodes\": dial tcp 172.24.4.161:6443: connect: connection refused" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.074000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.074000 audit: BPF prog-id=74 op=LOAD Dec 13 04:03:29.075000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.075000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1651 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313661366638656233373063633939343862333062383230373535 Dec 13 04:03:29.076000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.076000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1651 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313661366638656233373063633939343862333062383230373535 Dec 13 04:03:29.079265 systemd[1]: Started cri-containerd-ccce6416cb2fc702d3f61ccf00f7914f0880a4ec2c7ac76b6cfe90073530d9c7.scope. Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.080000 audit: BPF prog-id=75 op=LOAD Dec 13 04:03:29.080000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c8400 items=0 ppid=1651 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.084955 env[1147]: time="2024-12-13T04:03:29.084896351Z" level=info msg="StartContainer for \"d57b7a3add1c5d52a3f1ecd9883ef1d45f382d2a99ceea391c1a3d5add445ef7\" returns successfully" Dec 13 04:03:29.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313661366638656233373063633939343862333062383230373535 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.084000 audit: BPF prog-id=76 op=LOAD Dec 13 04:03:29.084000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c8448 items=0 ppid=1651 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.084000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313661366638656233373063633939343862333062383230373535 Dec 13 04:03:29.088000 audit: BPF prog-id=76 op=UNLOAD Dec 13 04:03:29.088000 audit: BPF prog-id=75 op=UNLOAD Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { perfmon } for pid=1773 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit[1773]: AVC avc: denied { bpf } for pid=1773 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.088000 audit: BPF prog-id=77 op=LOAD Dec 13 04:03:29.088000 audit[1773]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c8858 items=0 ppid=1651 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833313661366638656233373063633939343862333062383230373535 Dec 13 04:03:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.117000 audit: BPF prog-id=78 op=LOAD Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1644 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363636536343136636232666337303264336636316363663030663739 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1644 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363636536343136636232666337303264336636316363663030663739 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit: BPF prog-id=79 op=LOAD Dec 13 04:03:29.118000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00039c950 items=0 ppid=1644 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363636536343136636232666337303264336636316363663030663739 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit: BPF prog-id=80 op=LOAD Dec 13 04:03:29.118000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00039c998 items=0 ppid=1644 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363636536343136636232666337303264336636316363663030663739 Dec 13 04:03:29.118000 audit: BPF prog-id=80 op=UNLOAD Dec 13 04:03:29.118000 audit: BPF prog-id=79 op=UNLOAD Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:29.118000 audit: BPF prog-id=81 op=LOAD Dec 13 04:03:29.118000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039cda8 items=0 ppid=1644 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:29.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363636536343136636232666337303264336636316363663030663739 Dec 13 04:03:29.159500 env[1147]: time="2024-12-13T04:03:29.159441633Z" level=info msg="StartContainer for \"8316a6f8eb370cc9948b30b820755e8be284fb7b019b9d4a2dbba8e762f21c81\" returns successfully" Dec 13 04:03:29.182944 env[1147]: time="2024-12-13T04:03:29.182863970Z" level=info msg="StartContainer for \"ccce6416cb2fc702d3f61ccf00f7914f0880a4ec2c7ac76b6cfe90073530d9c7\" returns successfully" Dec 13 04:03:29.404747 kubelet[1582]: E1213 04:03:29.404639 1582 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://172.24.4.161:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 172.24.4.161:6443: connect: connection refused" logger="UnhandledError" Dec 13 04:03:30.671314 kubelet[1582]: I1213 04:03:30.671266 1582 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:31.626040 kernel: kauditd_printk_skb: 557 callbacks suppressed Dec 13 04:03:31.626194 kernel: audit: type=1400 audit(1734062611.619:566): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.619000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.632110 kernel: audit: type=1300 audit(1734062611.619:566): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cbd110 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:31.619000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cbd110 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:31.637546 kernel: audit: type=1327 audit(1734062611.619:566): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:31.619000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:31.641948 kernel: audit: type=1400 audit(1734062611.631:567): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.631000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.647877 kernel: audit: type=1300 audit(1734062611.631:567): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00024bca0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:31.631000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00024bca0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:31.631000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:31.652945 kernel: audit: type=1327 audit(1734062611.631:567): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:31.833000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.833000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006497fb0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.852366 kernel: audit: type=1400 audit(1734062611.833:568): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.852465 kernel: audit: type=1300 audit(1734062611.833:568): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006497fb0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.833000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.869180 kernel: audit: type=1327 audit(1734062611.833:568): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.869255 kernel: audit: type=1400 audit(1734062611.833:569): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.833000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00455fd80 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.833000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.839000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524549 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.839000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00353c3f0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.847000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.847000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4f a1=c00353cd20 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.847000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.913000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.913000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0031fb040 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.913000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.913000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:31.913000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=44 a1=c0066f8ab0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:03:31.913000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:03:31.977933 kubelet[1582]: E1213 04:03:31.977897 1582 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-b-9ccf4f3b90.novalocal\" not found" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:32.053783 kubelet[1582]: I1213 04:03:32.053732 1582 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:32.389484 kubelet[1582]: I1213 04:03:32.389390 1582 apiserver.go:52] "Watching apiserver" Dec 13 04:03:32.443198 kubelet[1582]: I1213 04:03:32.443130 1582 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 04:03:34.828687 systemd[1]: Reloading. Dec 13 04:03:34.958653 /usr/lib/systemd/system-generators/torcx-generator[1878]: time="2024-12-13T04:03:34Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 04:03:34.958687 /usr/lib/systemd/system-generators/torcx-generator[1878]: time="2024-12-13T04:03:34Z" level=info msg="torcx already run" Dec 13 04:03:35.046238 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 04:03:35.046259 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 04:03:35.073954 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 04:03:35.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.176000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.178000 audit: BPF prog-id=82 op=LOAD Dec 13 04:03:35.179000 audit: BPF prog-id=43 op=UNLOAD Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.180000 audit: BPF prog-id=83 op=LOAD Dec 13 04:03:35.180000 audit: BPF prog-id=44 op=UNLOAD Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.181000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.182000 audit: BPF prog-id=84 op=LOAD Dec 13 04:03:35.182000 audit: BPF prog-id=45 op=UNLOAD Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit: BPF prog-id=85 op=LOAD Dec 13 04:03:35.184000 audit: BPF prog-id=78 op=UNLOAD Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit: BPF prog-id=86 op=LOAD Dec 13 04:03:35.185000 audit: BPF prog-id=46 op=UNLOAD Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.185000 audit: BPF prog-id=87 op=LOAD Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.186000 audit: BPF prog-id=88 op=LOAD Dec 13 04:03:35.186000 audit: BPF prog-id=47 op=UNLOAD Dec 13 04:03:35.186000 audit: BPF prog-id=48 op=UNLOAD Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit: BPF prog-id=89 op=LOAD Dec 13 04:03:35.188000 audit: BPF prog-id=49 op=UNLOAD Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.188000 audit: BPF prog-id=90 op=LOAD Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.189000 audit: BPF prog-id=91 op=LOAD Dec 13 04:03:35.189000 audit: BPF prog-id=50 op=UNLOAD Dec 13 04:03:35.189000 audit: BPF prog-id=51 op=UNLOAD Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.193000 audit: BPF prog-id=92 op=LOAD Dec 13 04:03:35.193000 audit: BPF prog-id=58 op=UNLOAD Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.195000 audit: BPF prog-id=93 op=LOAD Dec 13 04:03:35.195000 audit: BPF prog-id=74 op=UNLOAD Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.198000 audit: BPF prog-id=94 op=LOAD Dec 13 04:03:35.198000 audit: BPF prog-id=52 op=UNLOAD Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit: BPF prog-id=95 op=LOAD Dec 13 04:03:35.202000 audit: BPF prog-id=53 op=UNLOAD Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit: BPF prog-id=96 op=LOAD Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.203000 audit: BPF prog-id=97 op=LOAD Dec 13 04:03:35.203000 audit: BPF prog-id=54 op=UNLOAD Dec 13 04:03:35.203000 audit: BPF prog-id=55 op=UNLOAD Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.204000 audit: BPF prog-id=98 op=LOAD Dec 13 04:03:35.205000 audit: BPF prog-id=62 op=UNLOAD Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.207000 audit: BPF prog-id=99 op=LOAD Dec 13 04:03:35.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.208000 audit: BPF prog-id=100 op=LOAD Dec 13 04:03:35.208000 audit: BPF prog-id=56 op=UNLOAD Dec 13 04:03:35.208000 audit: BPF prog-id=57 op=UNLOAD Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.209000 audit: BPF prog-id=101 op=LOAD Dec 13 04:03:35.209000 audit: BPF prog-id=70 op=UNLOAD Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:35.211000 audit: BPF prog-id=102 op=LOAD Dec 13 04:03:35.211000 audit: BPF prog-id=66 op=UNLOAD Dec 13 04:03:35.241252 systemd[1]: Stopping kubelet.service... Dec 13 04:03:35.269308 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 04:03:35.269691 systemd[1]: Stopped kubelet.service. Dec 13 04:03:35.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:35.269863 systemd[1]: kubelet.service: Consumed 1.189s CPU time. Dec 13 04:03:35.272526 systemd[1]: Starting kubelet.service... Dec 13 04:03:38.520330 kernel: kauditd_printk_skb: 259 callbacks suppressed Dec 13 04:03:38.520834 kernel: audit: type=1400 audit(1734062618.516:819): avc: denied { watch } for pid=1766 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524580 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 04:03:38.516000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524580 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 04:03:38.534673 kernel: audit: type=1300 audit(1734062618.516:819): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006e8a40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:38.516000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006e8a40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:38.516000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:38.544827 kernel: audit: type=1327 audit(1734062618.516:819): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:38.813201 systemd[1]: Started kubelet.service. Dec 13 04:03:38.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:38.821884 kernel: audit: type=1130 audit(1734062618.814:820): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:38.940891 kubelet[1926]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 04:03:38.940891 kubelet[1926]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 04:03:38.940891 kubelet[1926]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 04:03:38.945686 kubelet[1926]: I1213 04:03:38.945229 1926 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 04:03:38.973680 kubelet[1926]: I1213 04:03:38.973637 1926 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 04:03:38.973680 kubelet[1926]: I1213 04:03:38.973667 1926 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 04:03:38.973950 kubelet[1926]: I1213 04:03:38.973933 1926 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 04:03:38.975466 kubelet[1926]: I1213 04:03:38.975440 1926 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 04:03:38.981940 kubelet[1926]: I1213 04:03:38.981902 1926 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 04:03:38.992524 kubelet[1926]: E1213 04:03:38.992473 1926 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 04:03:38.992524 kubelet[1926]: I1213 04:03:38.992514 1926 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 04:03:38.995185 kubelet[1926]: I1213 04:03:38.995163 1926 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 04:03:38.995288 kubelet[1926]: I1213 04:03:38.995262 1926 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 04:03:38.995416 kubelet[1926]: I1213 04:03:38.995379 1926 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 04:03:38.995609 kubelet[1926]: I1213 04:03:38.995412 1926 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-b-9ccf4f3b90.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 04:03:38.995719 kubelet[1926]: I1213 04:03:38.995610 1926 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 04:03:38.995719 kubelet[1926]: I1213 04:03:38.995625 1926 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 04:03:38.995719 kubelet[1926]: I1213 04:03:38.995656 1926 state_mem.go:36] "Initialized new in-memory state store" Dec 13 04:03:38.995862 kubelet[1926]: I1213 04:03:38.995747 1926 kubelet.go:408] "Attempting to sync node with API server" Dec 13 04:03:38.995862 kubelet[1926]: I1213 04:03:38.995760 1926 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 04:03:38.995862 kubelet[1926]: I1213 04:03:38.995804 1926 kubelet.go:314] "Adding apiserver pod source" Dec 13 04:03:38.995862 kubelet[1926]: I1213 04:03:38.995816 1926 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 04:03:38.998297 kubelet[1926]: I1213 04:03:38.997299 1926 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 04:03:38.998297 kubelet[1926]: I1213 04:03:38.997875 1926 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 04:03:39.000262 kubelet[1926]: I1213 04:03:39.000247 1926 server.go:1269] "Started kubelet" Dec 13 04:03:39.025957 kubelet[1926]: I1213 04:03:39.025903 1926 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 04:03:39.030044 kubelet[1926]: I1213 04:03:39.030027 1926 server.go:460] "Adding debug handlers to kubelet server" Dec 13 04:03:39.031058 kubelet[1926]: I1213 04:03:39.030808 1926 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 04:03:39.031191 kubelet[1926]: I1213 04:03:39.031167 1926 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 04:03:39.032000 audit[1926]: AVC avc: denied { mac_admin } for pid=1926 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:39.037810 kernel: audit: type=1400 audit(1734062619.032:821): avc: denied { mac_admin } for pid=1926 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:39.032000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:39.040800 kernel: audit: type=1401 audit(1734062619.032:821): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:39.041232 kubelet[1926]: I1213 04:03:39.041177 1926 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 04:03:39.041317 kubelet[1926]: I1213 04:03:39.041256 1926 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 04:03:39.041317 kubelet[1926]: I1213 04:03:39.041286 1926 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 04:03:39.032000 audit[1926]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006e9e90 a1=c00089ad80 a2=c0006e9e30 a3=25 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:39.046786 kernel: audit: type=1300 audit(1734062619.032:821): arch=c000003e syscall=188 success=no exit=-22 a0=c0006e9e90 a1=c00089ad80 a2=c0006e9e30 a3=25 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:39.032000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:39.051755 kubelet[1926]: E1213 04:03:39.051716 1926 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 04:03:39.052019 kernel: audit: type=1327 audit(1734062619.032:821): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:39.052064 kernel: audit: type=1400 audit(1734062619.040:822): avc: denied { mac_admin } for pid=1926 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:39.040000 audit[1926]: AVC avc: denied { mac_admin } for pid=1926 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:39.054465 kubelet[1926]: I1213 04:03:39.054422 1926 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 04:03:39.040000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:39.060645 kubelet[1926]: I1213 04:03:39.060629 1926 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 04:03:39.060976 kubelet[1926]: I1213 04:03:39.060964 1926 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 04:03:39.061295 kubelet[1926]: I1213 04:03:39.061264 1926 reconciler.go:26] "Reconciler: start to sync state" Dec 13 04:03:39.062790 kernel: audit: type=1401 audit(1734062619.040:822): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:39.040000 audit[1926]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bbdf00 a1=c00089ad98 a2=c0006e9f20 a3=25 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:39.040000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:39.068090 kubelet[1926]: I1213 04:03:39.063889 1926 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 04:03:39.072759 kubelet[1926]: I1213 04:03:39.072028 1926 factory.go:221] Registration of the containerd container factory successfully Dec 13 04:03:39.072759 kubelet[1926]: I1213 04:03:39.072053 1926 factory.go:221] Registration of the systemd container factory successfully Dec 13 04:03:39.075979 kubelet[1926]: I1213 04:03:39.075944 1926 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 04:03:39.077185 kubelet[1926]: I1213 04:03:39.077169 1926 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 04:03:39.077309 kubelet[1926]: I1213 04:03:39.077293 1926 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 04:03:39.077405 kubelet[1926]: I1213 04:03:39.077394 1926 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 04:03:39.077524 kubelet[1926]: E1213 04:03:39.077505 1926 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 04:03:39.143283 kubelet[1926]: I1213 04:03:39.143238 1926 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 04:03:39.143283 kubelet[1926]: I1213 04:03:39.143275 1926 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 04:03:39.143452 kubelet[1926]: I1213 04:03:39.143295 1926 state_mem.go:36] "Initialized new in-memory state store" Dec 13 04:03:39.143452 kubelet[1926]: I1213 04:03:39.143442 1926 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 04:03:39.143521 kubelet[1926]: I1213 04:03:39.143453 1926 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 04:03:39.143521 kubelet[1926]: I1213 04:03:39.143472 1926 policy_none.go:49] "None policy: Start" Dec 13 04:03:39.144759 kubelet[1926]: I1213 04:03:39.144741 1926 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 04:03:39.144952 kubelet[1926]: I1213 04:03:39.144938 1926 state_mem.go:35] "Initializing new in-memory state store" Dec 13 04:03:39.145339 kubelet[1926]: I1213 04:03:39.145324 1926 state_mem.go:75] "Updated machine memory state" Dec 13 04:03:39.151149 kubelet[1926]: I1213 04:03:39.151129 1926 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 04:03:39.150000 audit[1926]: AVC avc: denied { mac_admin } for pid=1926 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:39.150000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 04:03:39.150000 audit[1926]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0010f2f30 a1=c001101bd8 a2=c0010f2f00 a3=25 items=0 ppid=1 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:39.151606 kubelet[1926]: I1213 04:03:39.151588 1926 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 04:03:39.151835 kubelet[1926]: I1213 04:03:39.151823 1926 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 04:03:39.151943 kubelet[1926]: I1213 04:03:39.151910 1926 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 04:03:39.150000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 04:03:39.152686 kubelet[1926]: I1213 04:03:39.152669 1926 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 04:03:39.194267 kubelet[1926]: W1213 04:03:39.194238 1926 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 04:03:39.207611 kubelet[1926]: W1213 04:03:39.207572 1926 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 04:03:39.207790 kubelet[1926]: W1213 04:03:39.207578 1926 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 04:03:39.218000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:39.218000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004a59c0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:39.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:39.219000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:39.219000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004a5c20 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:39.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:39.220000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:39.220000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0004a5fa0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:39.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:39.223000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:03:39.223000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d4c1a0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:03:39.223000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:03:39.264205 kubelet[1926]: I1213 04:03:39.264155 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.264467 kubelet[1926]: I1213 04:03:39.264443 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.264594 kubelet[1926]: I1213 04:03:39.264577 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.264713 kubelet[1926]: I1213 04:03:39.264697 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.264852 kubelet[1926]: I1213 04:03:39.264833 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.264987 kubelet[1926]: I1213 04:03:39.264970 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/96b9bfa06a266b170a7cb53d31b99fe3-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"96b9bfa06a266b170a7cb53d31b99fe3\") " pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.265133 kubelet[1926]: I1213 04:03:39.265117 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.265246 kubelet[1926]: I1213 04:03:39.265231 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/c465661d3ba2c608bc615eac61414bd7-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"c465661d3ba2c608bc615eac61414bd7\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.265369 kubelet[1926]: I1213 04:03:39.265346 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/254fc6acc1c97a4807c9ebe862bea150-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal\" (UID: \"254fc6acc1c97a4807c9ebe862bea150\") " pod="kube-system/kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.271308 kubelet[1926]: I1213 04:03:39.271275 1926 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.369230 kubelet[1926]: I1213 04:03:39.369102 1926 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.369590 kubelet[1926]: I1213 04:03:39.369569 1926 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:39.620323 kubelet[1926]: I1213 04:03:39.620164 1926 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 04:03:39.620817 env[1147]: time="2024-12-13T04:03:39.620705613Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 04:03:39.621278 kubelet[1926]: I1213 04:03:39.621259 1926 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 04:03:39.997012 kubelet[1926]: I1213 04:03:39.996966 1926 apiserver.go:52] "Watching apiserver" Dec 13 04:03:40.061473 kubelet[1926]: I1213 04:03:40.061412 1926 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 04:03:40.157405 kubelet[1926]: W1213 04:03:40.157332 1926 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 04:03:40.157702 kubelet[1926]: E1213 04:03:40.157445 1926 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:03:40.207453 kubelet[1926]: I1213 04:03:40.207355 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-b-9ccf4f3b90.novalocal" podStartSLOduration=1.207334146 podStartE2EDuration="1.207334146s" podCreationTimestamp="2024-12-13 04:03:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:03:40.180627467 +0000 UTC m=+1.323601747" watchObservedRunningTime="2024-12-13 04:03:40.207334146 +0000 UTC m=+1.350308426" Dec 13 04:03:40.270292 kubelet[1926]: I1213 04:03:40.270128 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-b-9ccf4f3b90.novalocal" podStartSLOduration=1.270107318 podStartE2EDuration="1.270107318s" podCreationTimestamp="2024-12-13 04:03:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:03:40.207645851 +0000 UTC m=+1.350620141" watchObservedRunningTime="2024-12-13 04:03:40.270107318 +0000 UTC m=+1.413081588" Dec 13 04:03:40.330743 kubelet[1926]: I1213 04:03:40.330674 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-b-9ccf4f3b90.novalocal" podStartSLOduration=1.330648991 podStartE2EDuration="1.330648991s" podCreationTimestamp="2024-12-13 04:03:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:03:40.27722267 +0000 UTC m=+1.420196960" watchObservedRunningTime="2024-12-13 04:03:40.330648991 +0000 UTC m=+1.473623261" Dec 13 04:03:40.339574 systemd[1]: Created slice kubepods-besteffort-pod0f997c13_8ef9_4f0f_a9f9_fdf68d42128b.slice. Dec 13 04:03:40.373509 kubelet[1926]: I1213 04:03:40.373447 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0f997c13-8ef9-4f0f-a9f9-fdf68d42128b-xtables-lock\") pod \"kube-proxy-jphxg\" (UID: \"0f997c13-8ef9-4f0f-a9f9-fdf68d42128b\") " pod="kube-system/kube-proxy-jphxg" Dec 13 04:03:40.373509 kubelet[1926]: I1213 04:03:40.373501 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0f997c13-8ef9-4f0f-a9f9-fdf68d42128b-lib-modules\") pod \"kube-proxy-jphxg\" (UID: \"0f997c13-8ef9-4f0f-a9f9-fdf68d42128b\") " pod="kube-system/kube-proxy-jphxg" Dec 13 04:03:40.373696 kubelet[1926]: I1213 04:03:40.373524 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0f997c13-8ef9-4f0f-a9f9-fdf68d42128b-kube-proxy\") pod \"kube-proxy-jphxg\" (UID: \"0f997c13-8ef9-4f0f-a9f9-fdf68d42128b\") " pod="kube-system/kube-proxy-jphxg" Dec 13 04:03:40.373696 kubelet[1926]: I1213 04:03:40.373543 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vqknq\" (UniqueName: \"kubernetes.io/projected/0f997c13-8ef9-4f0f-a9f9-fdf68d42128b-kube-api-access-vqknq\") pod \"kube-proxy-jphxg\" (UID: \"0f997c13-8ef9-4f0f-a9f9-fdf68d42128b\") " pod="kube-system/kube-proxy-jphxg" Dec 13 04:03:40.484898 kubelet[1926]: I1213 04:03:40.484869 1926 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 04:03:40.649089 env[1147]: time="2024-12-13T04:03:40.648108092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jphxg,Uid:0f997c13-8ef9-4f0f-a9f9-fdf68d42128b,Namespace:kube-system,Attempt:0,}" Dec 13 04:03:40.693221 env[1147]: time="2024-12-13T04:03:40.693088834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:40.693490 env[1147]: time="2024-12-13T04:03:40.693184364Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:40.693725 env[1147]: time="2024-12-13T04:03:40.693650950Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:40.694306 env[1147]: time="2024-12-13T04:03:40.694146100Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e35ad38138cf80fe9b8e0a80a1105db377e069659b17e8f94ab05114b5cd34c pid=1969 runtime=io.containerd.runc.v2 Dec 13 04:03:40.715786 systemd[1]: Started cri-containerd-9e35ad38138cf80fe9b8e0a80a1105db377e069659b17e8f94ab05114b5cd34c.scope. Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit: BPF prog-id=103 op=LOAD Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1969 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333561643338313338636638306665396238653061383061313130 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1969 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333561643338313338636638306665396238653061383061313130 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit: BPF prog-id=104 op=LOAD Dec 13 04:03:40.737000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d8dc0 items=0 ppid=1969 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333561643338313338636638306665396238653061383061313130 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit: BPF prog-id=105 op=LOAD Dec 13 04:03:40.737000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d8e08 items=0 ppid=1969 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333561643338313338636638306665396238653061383061313130 Dec 13 04:03:40.737000 audit: BPF prog-id=105 op=UNLOAD Dec 13 04:03:40.737000 audit: BPF prog-id=104 op=UNLOAD Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { perfmon } for pid=1979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit[1979]: AVC avc: denied { bpf } for pid=1979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.737000 audit: BPF prog-id=106 op=LOAD Dec 13 04:03:40.737000 audit[1979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d9218 items=0 ppid=1969 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965333561643338313338636638306665396238653061383061313130 Dec 13 04:03:40.754586 env[1147]: time="2024-12-13T04:03:40.754517993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jphxg,Uid:0f997c13-8ef9-4f0f-a9f9-fdf68d42128b,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e35ad38138cf80fe9b8e0a80a1105db377e069659b17e8f94ab05114b5cd34c\"" Dec 13 04:03:40.758084 env[1147]: time="2024-12-13T04:03:40.758034116Z" level=info msg="CreateContainer within sandbox \"9e35ad38138cf80fe9b8e0a80a1105db377e069659b17e8f94ab05114b5cd34c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 04:03:40.827741 env[1147]: time="2024-12-13T04:03:40.827677550Z" level=info msg="CreateContainer within sandbox \"9e35ad38138cf80fe9b8e0a80a1105db377e069659b17e8f94ab05114b5cd34c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"f5ca6f136a21db964e0863fef5fb1b96a3c8625ad36d350c409f3a050d420027\"" Dec 13 04:03:40.830093 env[1147]: time="2024-12-13T04:03:40.830006823Z" level=info msg="StartContainer for \"f5ca6f136a21db964e0863fef5fb1b96a3c8625ad36d350c409f3a050d420027\"" Dec 13 04:03:40.877159 systemd[1]: Started cri-containerd-f5ca6f136a21db964e0863fef5fb1b96a3c8625ad36d350c409f3a050d420027.scope. Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1a2e36da18 items=0 ppid=1969 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636136663133366132316462393634653038363366656635666231 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.895000 audit: BPF prog-id=107 op=LOAD Dec 13 04:03:40.895000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001796a8 items=0 ppid=1969 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.895000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636136663133366132316462393634653038363366656635666231 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.896000 audit: BPF prog-id=108 op=LOAD Dec 13 04:03:40.896000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001796f8 items=0 ppid=1969 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.896000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636136663133366132316462393634653038363366656635666231 Dec 13 04:03:40.899000 audit: BPF prog-id=108 op=UNLOAD Dec 13 04:03:40.899000 audit: BPF prog-id=107 op=UNLOAD Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { perfmon } for pid=2009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit[2009]: AVC avc: denied { bpf } for pid=2009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:40.899000 audit: BPF prog-id=109 op=LOAD Dec 13 04:03:40.899000 audit[2009]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000179788 items=0 ppid=1969 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:40.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635636136663133366132316462393634653038363366656635666231 Dec 13 04:03:40.939980 env[1147]: time="2024-12-13T04:03:40.939921486Z" level=info msg="StartContainer for \"f5ca6f136a21db964e0863fef5fb1b96a3c8625ad36d350c409f3a050d420027\" returns successfully" Dec 13 04:03:41.367000 audit[2067]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2067 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:41.367000 audit[2067]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda90a6db0 a2=0 a3=7ffda90a6d9c items=0 ppid=2020 pid=2067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.367000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 04:03:41.370000 audit[2068]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2068 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:41.371000 audit[2069]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2069 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.371000 audit[2069]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe94400e0 a2=0 a3=7fffe94400cc items=0 ppid=2020 pid=2069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 04:03:41.370000 audit[2068]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff729857e0 a2=0 a3=7fff729857cc items=0 ppid=2020 pid=2068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 04:03:41.372000 audit[2070]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2070 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.372000 audit[2070]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe11f19c60 a2=0 a3=7ffe11f19c4c items=0 ppid=2020 pid=2070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 04:03:41.373000 audit[2071]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2071 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:41.373000 audit[2071]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff870a5ca0 a2=0 a3=7fff870a5c8c items=0 ppid=2020 pid=2071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.373000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 04:03:41.375000 audit[2072]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2072 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.375000 audit[2072]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe037f220 a2=0 a3=7fffe037f20c items=0 ppid=2020 pid=2072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 04:03:41.471000 audit[2073]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2073 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.471000 audit[2073]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff47de8980 a2=0 a3=7fff47de896c items=0 ppid=2020 pid=2073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 04:03:41.489972 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1429363247.mount: Deactivated successfully. Dec 13 04:03:41.492000 audit[2075]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2075 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.492000 audit[2075]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe1457e920 a2=0 a3=7ffe1457e90c items=0 ppid=2020 pid=2075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 04:03:41.578000 audit[2079]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2079 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.578000 audit[2079]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc4e0cfe50 a2=0 a3=7ffc4e0cfe3c items=0 ppid=2020 pid=2079 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 04:03:41.611000 audit[2080]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2080 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.611000 audit[2080]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce4207f80 a2=0 a3=7ffce4207f6c items=0 ppid=2020 pid=2080 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.611000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 04:03:41.643000 audit[2082]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2082 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.643000 audit[2082]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdbaa87e0 a2=0 a3=7fffdbaa87cc items=0 ppid=2020 pid=2082 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.643000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 04:03:41.646000 audit[2083]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2083 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.646000 audit[2083]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9f472a80 a2=0 a3=7ffd9f472a6c items=0 ppid=2020 pid=2083 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 04:03:41.713000 audit[2085]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2085 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.713000 audit[2085]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde2a349a0 a2=0 a3=7ffde2a3498c items=0 ppid=2020 pid=2085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 04:03:41.797000 audit[2088]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2088 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.797000 audit[2088]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa147f7d0 a2=0 a3=7fffa147f7bc items=0 ppid=2020 pid=2088 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.797000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 04:03:41.812000 audit[2089]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2089 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.812000 audit[2089]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd58e92490 a2=0 a3=7ffd58e9247c items=0 ppid=2020 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.812000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 04:03:41.886000 audit[2091]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2091 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.886000 audit[2091]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffed77dee70 a2=0 a3=7ffed77dee5c items=0 ppid=2020 pid=2091 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 04:03:41.887000 audit[2092]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2092 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.887000 audit[2092]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd78d0320 a2=0 a3=7ffdd78d030c items=0 ppid=2020 pid=2092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 04:03:41.890000 audit[2094]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2094 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.890000 audit[2094]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff23931340 a2=0 a3=7fff2393132c items=0 ppid=2020 pid=2094 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 04:03:41.893000 audit[2097]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.893000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdaef93c60 a2=0 a3=7ffdaef93c4c items=0 ppid=2020 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 04:03:41.897000 audit[2100]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.897000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd286a7e80 a2=0 a3=7ffd286a7e6c items=0 ppid=2020 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 04:03:41.898000 audit[2101]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2101 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.898000 audit[2101]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffda8d015c0 a2=0 a3=7ffda8d015ac items=0 ppid=2020 pid=2101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.898000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 04:03:41.902000 audit[2103]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2103 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.902000 audit[2103]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdb1fa8d90 a2=0 a3=7ffdb1fa8d7c items=0 ppid=2020 pid=2103 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 04:03:41.905000 audit[2106]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2106 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.905000 audit[2106]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdf0b013f0 a2=0 a3=7ffdf0b013dc items=0 ppid=2020 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 04:03:41.909000 audit[2107]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2107 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.909000 audit[2107]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6a9bcd30 a2=0 a3=7ffe6a9bcd1c items=0 ppid=2020 pid=2107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 04:03:41.914000 audit[2109]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2109 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 04:03:41.914000 audit[2109]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffef9be0100 a2=0 a3=7ffef9be00ec items=0 ppid=2020 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 04:03:41.956000 audit[2115]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:41.956000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdfaf8e1c0 a2=0 a3=7ffdfaf8e1ac items=0 ppid=2020 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.956000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:41.988000 audit[2115]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:41.988000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdfaf8e1c0 a2=0 a3=7ffdfaf8e1ac items=0 ppid=2020 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:41.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:42.007000 audit[2120]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2120 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.007000 audit[2120]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffcc7ba2750 a2=0 a3=7ffcc7ba273c items=0 ppid=2020 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.007000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 04:03:42.014000 audit[2122]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.014000 audit[2122]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe54317270 a2=0 a3=7ffe5431725c items=0 ppid=2020 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.014000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 04:03:42.025000 audit[2125]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2125 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.025000 audit[2125]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcc452fb10 a2=0 a3=7ffcc452fafc items=0 ppid=2020 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.025000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 04:03:42.026000 audit[2126]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.026000 audit[2126]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1f336680 a2=0 a3=7ffc1f33666c items=0 ppid=2020 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.026000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 04:03:42.029000 audit[2128]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2128 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.029000 audit[2128]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff5ef7f6c0 a2=0 a3=7fff5ef7f6ac items=0 ppid=2020 pid=2128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 04:03:42.031000 audit[2129]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2129 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.031000 audit[2129]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffe0b20ad0 a2=0 a3=7fffe0b20abc items=0 ppid=2020 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 04:03:42.043000 audit[2131]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.043000 audit[2131]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcc84de190 a2=0 a3=7ffcc84de17c items=0 ppid=2020 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 04:03:42.051000 audit[2134]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.051000 audit[2134]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffcdbd18930 a2=0 a3=7ffcdbd1891c items=0 ppid=2020 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 04:03:42.058000 audit[2135]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.058000 audit[2135]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdef2346d0 a2=0 a3=7ffdef2346bc items=0 ppid=2020 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 04:03:42.060000 audit[2137]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2137 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.060000 audit[2137]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffcf597020 a2=0 a3=7fffcf59700c items=0 ppid=2020 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.060000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 04:03:42.061000 audit[2138]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.061000 audit[2138]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdf960640 a2=0 a3=7fffdf96062c items=0 ppid=2020 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 04:03:42.064000 audit[2140]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2140 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.064000 audit[2140]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1d4b4730 a2=0 a3=7ffc1d4b471c items=0 ppid=2020 pid=2140 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 04:03:42.067000 audit[2143]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2143 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.067000 audit[2143]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe8b021970 a2=0 a3=7ffe8b02195c items=0 ppid=2020 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.067000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 04:03:42.070000 audit[2146]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2146 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.070000 audit[2146]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe2eae25b0 a2=0 a3=7ffe2eae259c items=0 ppid=2020 pid=2146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.070000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 04:03:42.071000 audit[2147]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.071000 audit[2147]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffded4fa0e0 a2=0 a3=7ffded4fa0cc items=0 ppid=2020 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 04:03:42.073000 audit[2149]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.073000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe3ded34d0 a2=0 a3=7ffe3ded34bc items=0 ppid=2020 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.073000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 04:03:42.076000 audit[2152]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.076000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffda6dcf900 a2=0 a3=7ffda6dcf8ec items=0 ppid=2020 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 04:03:42.078000 audit[2153]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.078000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbf0d59f0 a2=0 a3=7ffdbf0d59dc items=0 ppid=2020 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 04:03:42.081000 audit[2155]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.081000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe042a91f0 a2=0 a3=7ffe042a91dc items=0 ppid=2020 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 04:03:42.083000 audit[2156]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.083000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3d8b8630 a2=0 a3=7ffd3d8b861c items=0 ppid=2020 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.083000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 04:03:42.085000 audit[2158]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.085000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffea7571a30 a2=0 a3=7ffea7571a1c items=0 ppid=2020 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.085000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 04:03:42.088000 audit[2161]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 04:03:42.088000 audit[2161]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffddb5fbb60 a2=0 a3=7ffddb5fbb4c items=0 ppid=2020 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 04:03:42.091000 audit[2163]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 04:03:42.091000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fffc72d26c0 a2=0 a3=7fffc72d26ac items=0 ppid=2020 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.091000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:42.092000 audit[2163]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 04:03:42.092000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fffc72d26c0 a2=0 a3=7fffc72d26ac items=0 ppid=2020 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.092000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:42.449539 kubelet[1926]: I1213 04:03:42.449481 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-jphxg" podStartSLOduration=2.449462421 podStartE2EDuration="2.449462421s" podCreationTimestamp="2024-12-13 04:03:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:03:41.23880377 +0000 UTC m=+2.381778070" watchObservedRunningTime="2024-12-13 04:03:42.449462421 +0000 UTC m=+3.592436701" Dec 13 04:03:42.456845 systemd[1]: Created slice kubepods-besteffort-podc0dc06ae_af07_4d99_98d0_484cb341143b.slice. Dec 13 04:03:42.587401 kubelet[1926]: I1213 04:03:42.587350 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c0dc06ae-af07-4d99-98d0-484cb341143b-var-lib-calico\") pod \"tigera-operator-76c4976dd7-46xnp\" (UID: \"c0dc06ae-af07-4d99-98d0-484cb341143b\") " pod="tigera-operator/tigera-operator-76c4976dd7-46xnp" Dec 13 04:03:42.587401 kubelet[1926]: I1213 04:03:42.587409 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9cq28\" (UniqueName: \"kubernetes.io/projected/c0dc06ae-af07-4d99-98d0-484cb341143b-kube-api-access-9cq28\") pod \"tigera-operator-76c4976dd7-46xnp\" (UID: \"c0dc06ae-af07-4d99-98d0-484cb341143b\") " pod="tigera-operator/tigera-operator-76c4976dd7-46xnp" Dec 13 04:03:42.760864 env[1147]: time="2024-12-13T04:03:42.760441519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-46xnp,Uid:c0dc06ae-af07-4d99-98d0-484cb341143b,Namespace:tigera-operator,Attempt:0,}" Dec 13 04:03:42.797440 env[1147]: time="2024-12-13T04:03:42.797064559Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:42.797440 env[1147]: time="2024-12-13T04:03:42.797129661Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:42.797440 env[1147]: time="2024-12-13T04:03:42.797147965Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:42.797440 env[1147]: time="2024-12-13T04:03:42.797287447Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016 pid=2178 runtime=io.containerd.runc.v2 Dec 13 04:03:42.818799 systemd[1]: run-containerd-runc-k8s.io-e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016-runc.WFTJtQ.mount: Deactivated successfully. Dec 13 04:03:42.823678 systemd[1]: Started cri-containerd-e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016.scope. Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.840000 audit: BPF prog-id=110 op=LOAD Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2178 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653331313833313139616637643066616166376162373539393237 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2178 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653331313833313139616637643066616166376162373539393237 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.842000 audit: BPF prog-id=111 op=LOAD Dec 13 04:03:42.842000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000359eb0 items=0 ppid=2178 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.842000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653331313833313139616637643066616166376162373539393237 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.843000 audit: BPF prog-id=112 op=LOAD Dec 13 04:03:42.843000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000359ef8 items=0 ppid=2178 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653331313833313139616637643066616166376162373539393237 Dec 13 04:03:42.844000 audit: BPF prog-id=112 op=UNLOAD Dec 13 04:03:42.844000 audit: BPF prog-id=111 op=UNLOAD Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { perfmon } for pid=2186 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit[2186]: AVC avc: denied { bpf } for pid=2186 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:42.844000 audit: BPF prog-id=113 op=LOAD Dec 13 04:03:42.844000 audit[2186]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003da308 items=0 ppid=2178 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:42.844000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535653331313833313139616637643066616166376162373539393237 Dec 13 04:03:42.888399 env[1147]: time="2024-12-13T04:03:42.888338223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-46xnp,Uid:c0dc06ae-af07-4d99-98d0-484cb341143b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016\"" Dec 13 04:03:42.892942 env[1147]: time="2024-12-13T04:03:42.892913673Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 04:03:45.675222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2998195220.mount: Deactivated successfully. Dec 13 04:03:48.571407 env[1147]: time="2024-12-13T04:03:48.571209640Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:48.593075 env[1147]: time="2024-12-13T04:03:48.592983125Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:48.611244 env[1147]: time="2024-12-13T04:03:48.605100648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:48.622221 env[1147]: time="2024-12-13T04:03:48.622093260Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 04:03:48.626020 env[1147]: time="2024-12-13T04:03:48.625926225Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:48.635512 env[1147]: time="2024-12-13T04:03:48.635437345Z" level=info msg="CreateContainer within sandbox \"e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 04:03:48.706567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3277492053.mount: Deactivated successfully. Dec 13 04:03:48.716435 env[1147]: time="2024-12-13T04:03:48.716369393Z" level=info msg="CreateContainer within sandbox \"e5e31183119af7d0faaf7ab759927c8fe5d758d864167335a8eb34ade20b1016\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8514f7baa79011b3fea61b2db5b815bd5de3ffd0acf38d9a3d528a5eec587f8f\"" Dec 13 04:03:48.717432 env[1147]: time="2024-12-13T04:03:48.717397692Z" level=info msg="StartContainer for \"8514f7baa79011b3fea61b2db5b815bd5de3ffd0acf38d9a3d528a5eec587f8f\"" Dec 13 04:03:48.764941 systemd[1]: run-containerd-runc-k8s.io-8514f7baa79011b3fea61b2db5b815bd5de3ffd0acf38d9a3d528a5eec587f8f-runc.FKOpCy.mount: Deactivated successfully. Dec 13 04:03:48.771255 systemd[1]: Started cri-containerd-8514f7baa79011b3fea61b2db5b815bd5de3ffd0acf38d9a3d528a5eec587f8f.scope. Dec 13 04:03:48.803348 kernel: kauditd_printk_skb: 328 callbacks suppressed Dec 13 04:03:48.803523 kernel: audit: type=1400 audit(1734062628.797:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.812993 kernel: audit: type=1400 audit(1734062628.797:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.813083 kernel: audit: type=1400 audit(1734062628.797:923): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.820829 kernel: audit: type=1400 audit(1734062628.797:924): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.830555 kernel: audit: type=1400 audit(1734062628.797:925): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.830672 kernel: audit: type=1400 audit(1734062628.797:926): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.843813 kernel: audit: type=1400 audit(1734062628.797:927): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.852753 kernel: audit: type=1400 audit(1734062628.797:928): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.852874 kernel: audit: type=1400 audit(1734062628.797:929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.857789 kernel: audit: type=1400 audit(1734062628.797:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.797000 audit: BPF prog-id=114 op=LOAD Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2178 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:48.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313466376261613739303131623366656136316232646235623831 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2178 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:48.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313466376261613739303131623366656136316232646235623831 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.798000 audit: BPF prog-id=115 op=LOAD Dec 13 04:03:48.798000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df4a0 items=0 ppid=2178 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:48.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313466376261613739303131623366656136316232646235623831 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.799000 audit: BPF prog-id=116 op=LOAD Dec 13 04:03:48.799000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df4e8 items=0 ppid=2178 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:48.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313466376261613739303131623366656136316232646235623831 Dec 13 04:03:48.803000 audit: BPF prog-id=116 op=UNLOAD Dec 13 04:03:48.803000 audit: BPF prog-id=115 op=UNLOAD Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { perfmon } for pid=2242 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit[2242]: AVC avc: denied { bpf } for pid=2242 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:48.803000 audit: BPF prog-id=117 op=LOAD Dec 13 04:03:48.803000 audit[2242]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001df8f8 items=0 ppid=2178 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:48.803000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835313466376261613739303131623366656136316232646235623831 Dec 13 04:03:48.870084 env[1147]: time="2024-12-13T04:03:48.869995315Z" level=info msg="StartContainer for \"8514f7baa79011b3fea61b2db5b815bd5de3ffd0acf38d9a3d528a5eec587f8f\" returns successfully" Dec 13 04:03:48.875000 audit[1305]: USER_END pid=1305 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:03:48.875000 audit[1305]: CRED_DISP pid=1305 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 04:03:48.876163 sudo[1305]: pam_unix(sudo:session): session closed for user root Dec 13 04:03:49.229334 sshd[1301]: pam_unix(sshd:session): session closed for user core Dec 13 04:03:49.234000 audit[1301]: USER_END pid=1301 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:03:49.235000 audit[1301]: CRED_DISP pid=1301 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:03:49.238701 systemd[1]: sshd@6-172.24.4.161:22-172.24.4.1:42252.service: Deactivated successfully. Dec 13 04:03:49.240460 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 04:03:49.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-172.24.4.161:22-172.24.4.1:42252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:03:49.240826 systemd[1]: session-7.scope: Consumed 7.555s CPU time. Dec 13 04:03:49.243964 systemd-logind[1136]: Session 7 logged out. Waiting for processes to exit. Dec 13 04:03:49.247895 systemd-logind[1136]: Removed session 7. Dec 13 04:03:52.095000 audit[2285]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:52.095000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffde1328a40 a2=0 a3=7ffde1328a2c items=0 ppid=2020 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:52.095000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:52.099000 audit[2285]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:52.099000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffde1328a40 a2=0 a3=0 items=0 ppid=2020 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:52.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:52.250000 audit[2287]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:52.250000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffd542b5e0 a2=0 a3=7fffd542b5cc items=0 ppid=2020 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:52.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:52.255000 audit[2287]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:52.255000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffd542b5e0 a2=0 a3=0 items=0 ppid=2020 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:52.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:52.532600 kubelet[1926]: I1213 04:03:52.532455 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-46xnp" podStartSLOduration=4.792224833 podStartE2EDuration="10.532416859s" podCreationTimestamp="2024-12-13 04:03:42 +0000 UTC" firstStartedPulling="2024-12-13 04:03:42.891851309 +0000 UTC m=+4.034825579" lastFinishedPulling="2024-12-13 04:03:48.632043285 +0000 UTC m=+9.775017605" observedRunningTime="2024-12-13 04:03:49.647630091 +0000 UTC m=+10.790640037" watchObservedRunningTime="2024-12-13 04:03:52.532416859 +0000 UTC m=+13.675391179" Dec 13 04:03:52.554450 systemd[1]: Created slice kubepods-besteffort-pod1ab4f8d2_dd1c_4f8b_adda_0e7158a8197b.slice. Dec 13 04:03:52.702377 systemd[1]: Created slice kubepods-besteffort-pod716b4e6c_1d46_4e95_b2a2_debd1c4f582e.slice. Dec 13 04:03:52.703516 kubelet[1926]: I1213 04:03:52.703482 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gkrdg\" (UniqueName: \"kubernetes.io/projected/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-kube-api-access-gkrdg\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703631 kubelet[1926]: I1213 04:03:52.703526 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b-tigera-ca-bundle\") pod \"calico-typha-54b5dfd4ff-f95cd\" (UID: \"1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b\") " pod="calico-system/calico-typha-54b5dfd4ff-f95cd" Dec 13 04:03:52.703631 kubelet[1926]: I1213 04:03:52.703548 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-cni-net-dir\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703631 kubelet[1926]: I1213 04:03:52.703569 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-flexvol-driver-host\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703631 kubelet[1926]: I1213 04:03:52.703587 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-xtables-lock\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703631 kubelet[1926]: I1213 04:03:52.703609 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hg7pb\" (UniqueName: \"kubernetes.io/projected/1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b-kube-api-access-hg7pb\") pod \"calico-typha-54b5dfd4ff-f95cd\" (UID: \"1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b\") " pod="calico-system/calico-typha-54b5dfd4ff-f95cd" Dec 13 04:03:52.703830 kubelet[1926]: I1213 04:03:52.703628 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-node-certs\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703830 kubelet[1926]: I1213 04:03:52.703646 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-lib-modules\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703830 kubelet[1926]: I1213 04:03:52.703664 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-policysync\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703830 kubelet[1926]: I1213 04:03:52.703689 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-tigera-ca-bundle\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703830 kubelet[1926]: I1213 04:03:52.703707 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-var-lib-calico\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703987 kubelet[1926]: I1213 04:03:52.703725 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b-typha-certs\") pod \"calico-typha-54b5dfd4ff-f95cd\" (UID: \"1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b\") " pod="calico-system/calico-typha-54b5dfd4ff-f95cd" Dec 13 04:03:52.703987 kubelet[1926]: I1213 04:03:52.703743 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-var-run-calico\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703987 kubelet[1926]: I1213 04:03:52.703760 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-cni-bin-dir\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.703987 kubelet[1926]: I1213 04:03:52.703808 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/716b4e6c-1d46-4e95-b2a2-debd1c4f582e-cni-log-dir\") pod \"calico-node-d4mzn\" (UID: \"716b4e6c-1d46-4e95-b2a2-debd1c4f582e\") " pod="calico-system/calico-node-d4mzn" Dec 13 04:03:52.823921 kubelet[1926]: E1213 04:03:52.823182 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:52.823921 kubelet[1926]: W1213 04:03:52.823213 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:52.823921 kubelet[1926]: E1213 04:03:52.823268 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:52.823921 kubelet[1926]: E1213 04:03:52.823503 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:52.823921 kubelet[1926]: W1213 04:03:52.823515 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:52.823921 kubelet[1926]: E1213 04:03:52.823532 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:52.835902 kubelet[1926]: E1213 04:03:52.835877 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:52.836131 kubelet[1926]: W1213 04:03:52.836109 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:52.836272 kubelet[1926]: E1213 04:03:52.836254 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:52.872281 kubelet[1926]: E1213 04:03:52.872237 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:52.872281 kubelet[1926]: W1213 04:03:52.872273 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:52.872474 kubelet[1926]: E1213 04:03:52.872294 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:52.883403 kubelet[1926]: E1213 04:03:52.883371 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:52.883403 kubelet[1926]: W1213 04:03:52.883394 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:52.883631 kubelet[1926]: E1213 04:03:52.883420 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.001012 kubelet[1926]: E1213 04:03:53.000906 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:03:53.006762 kubelet[1926]: E1213 04:03:53.006714 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.007173 kubelet[1926]: W1213 04:03:53.007103 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.007437 kubelet[1926]: E1213 04:03:53.007368 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.008300 kubelet[1926]: E1213 04:03:53.008268 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.008523 kubelet[1926]: W1213 04:03:53.008491 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.008759 kubelet[1926]: E1213 04:03:53.008728 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.010481 kubelet[1926]: E1213 04:03:53.010446 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.010838 kubelet[1926]: W1213 04:03:53.010742 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.011117 kubelet[1926]: E1213 04:03:53.011054 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.012829 kubelet[1926]: E1213 04:03:53.012724 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.013063 kubelet[1926]: W1213 04:03:53.013030 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.013342 kubelet[1926]: E1213 04:03:53.013283 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.015745 kubelet[1926]: E1213 04:03:53.015708 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.016296 kubelet[1926]: W1213 04:03:53.016251 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.016517 kubelet[1926]: E1213 04:03:53.016487 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.017179 kubelet[1926]: E1213 04:03:53.017152 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.017353 kubelet[1926]: W1213 04:03:53.017325 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.017573 kubelet[1926]: E1213 04:03:53.017539 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.018095 kubelet[1926]: E1213 04:03:53.018068 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.018310 kubelet[1926]: W1213 04:03:53.018280 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.018491 kubelet[1926]: E1213 04:03:53.018463 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.020153 kubelet[1926]: E1213 04:03:53.020097 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.020422 kubelet[1926]: W1213 04:03:53.020387 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.020606 kubelet[1926]: E1213 04:03:53.020571 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.021733 kubelet[1926]: E1213 04:03:53.021704 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.024823 env[1147]: time="2024-12-13T04:03:53.023571449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d4mzn,Uid:716b4e6c-1d46-4e95-b2a2-debd1c4f582e,Namespace:calico-system,Attempt:0,}" Dec 13 04:03:53.025838 kubelet[1926]: W1213 04:03:53.025724 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.026128 kubelet[1926]: E1213 04:03:53.026065 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.028150 kubelet[1926]: E1213 04:03:53.028081 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.028445 kubelet[1926]: W1213 04:03:53.028413 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.028691 kubelet[1926]: E1213 04:03:53.028637 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.029890 kubelet[1926]: E1213 04:03:53.029841 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.030448 kubelet[1926]: W1213 04:03:53.030410 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.034255 kubelet[1926]: E1213 04:03:53.034180 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.035595 kubelet[1926]: E1213 04:03:53.035564 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.036126 kubelet[1926]: W1213 04:03:53.036087 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.039012 kubelet[1926]: E1213 04:03:53.038942 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.044943 kubelet[1926]: E1213 04:03:53.044890 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.045261 kubelet[1926]: W1213 04:03:53.045149 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.045392 kubelet[1926]: E1213 04:03:53.045350 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.046108 kubelet[1926]: E1213 04:03:53.046089 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.046211 kubelet[1926]: W1213 04:03:53.046192 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.046366 kubelet[1926]: E1213 04:03:53.046349 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.046693 kubelet[1926]: E1213 04:03:53.046679 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.046839 kubelet[1926]: W1213 04:03:53.046823 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.046891 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.048458 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.049233 kubelet[1926]: W1213 04:03:53.048479 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.048502 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.048850 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.049233 kubelet[1926]: W1213 04:03:53.048862 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.048874 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.049045 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.049233 kubelet[1926]: W1213 04:03:53.049056 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.049233 kubelet[1926]: E1213 04:03:53.049069 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.049680 kubelet[1926]: E1213 04:03:53.049666 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.049870 kubelet[1926]: W1213 04:03:53.049853 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.049952 kubelet[1926]: E1213 04:03:53.049939 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.050658 kubelet[1926]: E1213 04:03:53.050645 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.050750 kubelet[1926]: W1213 04:03:53.050736 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.050864 kubelet[1926]: E1213 04:03:53.050850 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.051239 kubelet[1926]: E1213 04:03:53.051227 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.051376 kubelet[1926]: W1213 04:03:53.051353 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.051456 kubelet[1926]: E1213 04:03:53.051442 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.051555 kubelet[1926]: I1213 04:03:53.051539 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/02dbc368-79f2-4a05-bc9e-bb995dd7d205-kubelet-dir\") pod \"csi-node-driver-c4vc5\" (UID: \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\") " pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:03:53.052856 kubelet[1926]: E1213 04:03:53.052841 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.052949 kubelet[1926]: W1213 04:03:53.052936 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.053026 kubelet[1926]: E1213 04:03:53.053013 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.053296 kubelet[1926]: E1213 04:03:53.053284 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.053372 kubelet[1926]: W1213 04:03:53.053360 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.053439 kubelet[1926]: E1213 04:03:53.053427 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.053663 kubelet[1926]: E1213 04:03:53.053652 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.053744 kubelet[1926]: W1213 04:03:53.053732 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.053872 kubelet[1926]: E1213 04:03:53.053858 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.053984 kubelet[1926]: I1213 04:03:53.053965 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hfvxf\" (UniqueName: \"kubernetes.io/projected/02dbc368-79f2-4a05-bc9e-bb995dd7d205-kube-api-access-hfvxf\") pod \"csi-node-driver-c4vc5\" (UID: \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\") " pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:03:53.054346 kubelet[1926]: E1213 04:03:53.054327 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.054549 kubelet[1926]: W1213 04:03:53.054529 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.054698 kubelet[1926]: E1213 04:03:53.054684 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.055548 kubelet[1926]: E1213 04:03:53.055534 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.055695 kubelet[1926]: W1213 04:03:53.055679 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.055824 kubelet[1926]: E1213 04:03:53.055808 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.056018 kubelet[1926]: I1213 04:03:53.056002 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/02dbc368-79f2-4a05-bc9e-bb995dd7d205-socket-dir\") pod \"csi-node-driver-c4vc5\" (UID: \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\") " pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:03:53.056163 kubelet[1926]: E1213 04:03:53.056139 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.056273 kubelet[1926]: W1213 04:03:53.056259 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.056369 kubelet[1926]: E1213 04:03:53.056356 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.056659 kubelet[1926]: E1213 04:03:53.056646 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.056736 kubelet[1926]: W1213 04:03:53.056724 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.056923 kubelet[1926]: E1213 04:03:53.056902 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.057164 kubelet[1926]: I1213 04:03:53.057146 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/02dbc368-79f2-4a05-bc9e-bb995dd7d205-registration-dir\") pod \"csi-node-driver-c4vc5\" (UID: \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\") " pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:03:53.057373 kubelet[1926]: E1213 04:03:53.057301 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.057517 kubelet[1926]: W1213 04:03:53.057502 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.057616 kubelet[1926]: E1213 04:03:53.057590 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.058173 kubelet[1926]: E1213 04:03:53.058158 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.058271 kubelet[1926]: W1213 04:03:53.058257 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.058362 kubelet[1926]: E1213 04:03:53.058348 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.058747 kubelet[1926]: E1213 04:03:53.058729 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.058990 kubelet[1926]: W1213 04:03:53.058966 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.059091 kubelet[1926]: E1213 04:03:53.059077 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.059285 kubelet[1926]: I1213 04:03:53.059262 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/02dbc368-79f2-4a05-bc9e-bb995dd7d205-varrun\") pod \"csi-node-driver-c4vc5\" (UID: \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\") " pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:03:53.059499 kubelet[1926]: E1213 04:03:53.059484 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.059603 kubelet[1926]: W1213 04:03:53.059586 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.059705 kubelet[1926]: E1213 04:03:53.059687 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.069925 kubelet[1926]: E1213 04:03:53.069889 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.069925 kubelet[1926]: W1213 04:03:53.069916 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.070167 kubelet[1926]: E1213 04:03:53.069949 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.070225 kubelet[1926]: E1213 04:03:53.070196 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.070225 kubelet[1926]: W1213 04:03:53.070211 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.070329 kubelet[1926]: E1213 04:03:53.070226 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.070423 kubelet[1926]: E1213 04:03:53.070401 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.070494 kubelet[1926]: W1213 04:03:53.070422 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.070494 kubelet[1926]: E1213 04:03:53.070437 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.076890 env[1147]: time="2024-12-13T04:03:53.076712516Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:53.081295 env[1147]: time="2024-12-13T04:03:53.078302150Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:53.082484 env[1147]: time="2024-12-13T04:03:53.082429685Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:53.083127 env[1147]: time="2024-12-13T04:03:53.083054276Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad pid=2340 runtime=io.containerd.runc.v2 Dec 13 04:03:53.120035 systemd[1]: Started cri-containerd-97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad.scope. Dec 13 04:03:53.159892 env[1147]: time="2024-12-13T04:03:53.159851004Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b5dfd4ff-f95cd,Uid:1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b,Namespace:calico-system,Attempt:0,}" Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.165000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.166000 audit: BPF prog-id=118 op=LOAD Dec 13 04:03:53.167000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.167000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2340 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636534326132363936623764613764336634666666353732636563 Dec 13 04:03:53.167000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.167000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=c items=0 ppid=2340 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636534326132363936623764613764336634666666353732636563 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.168000 audit: BPF prog-id=119 op=LOAD Dec 13 04:03:53.168000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000390920 items=0 ppid=2340 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636534326132363936623764613764336634666666353732636563 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172162 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.173518 kubelet[1926]: W1213 04:03:53.172192 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172256 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172513 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.173518 kubelet[1926]: W1213 04:03:53.172524 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172542 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172743 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.173518 kubelet[1926]: W1213 04:03:53.172752 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172781 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.173518 kubelet[1926]: E1213 04:03:53.172983 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.174228 kubelet[1926]: W1213 04:03:53.172998 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.174228 kubelet[1926]: E1213 04:03:53.173011 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.174228 kubelet[1926]: E1213 04:03:53.173193 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.174228 kubelet[1926]: W1213 04:03:53.173203 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.174228 kubelet[1926]: E1213 04:03:53.173213 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.174228 kubelet[1926]: E1213 04:03:53.173413 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.174228 kubelet[1926]: W1213 04:03:53.173423 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.174228 kubelet[1926]: E1213 04:03:53.173434 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.174566 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.176697 kubelet[1926]: W1213 04:03:53.174595 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.174741 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.175010 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.176697 kubelet[1926]: W1213 04:03:53.175020 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.175056 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.175217 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.176697 kubelet[1926]: W1213 04:03:53.175226 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.175253 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.176697 kubelet[1926]: E1213 04:03:53.175411 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.177313 kubelet[1926]: W1213 04:03:53.175420 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.175463 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.175588 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.177313 kubelet[1926]: W1213 04:03:53.175596 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.175675 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.175848 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.177313 kubelet[1926]: W1213 04:03:53.175859 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.175877 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.177313 kubelet[1926]: E1213 04:03:53.176128 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.177313 kubelet[1926]: W1213 04:03:53.176139 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.176150 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.176374 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.178352 kubelet[1926]: W1213 04:03:53.176384 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.176395 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.176550 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.178352 kubelet[1926]: W1213 04:03:53.176559 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.176572 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.177904 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.178352 kubelet[1926]: W1213 04:03:53.177925 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.178352 kubelet[1926]: E1213 04:03:53.178058 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.178963 kubelet[1926]: E1213 04:03:53.178717 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.178963 kubelet[1926]: W1213 04:03:53.178730 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.178963 kubelet[1926]: E1213 04:03:53.178756 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.179326 kubelet[1926]: E1213 04:03:53.179156 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.179326 kubelet[1926]: W1213 04:03:53.179168 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.179326 kubelet[1926]: E1213 04:03:53.179199 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.179686 kubelet[1926]: E1213 04:03:53.179558 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.179686 kubelet[1926]: W1213 04:03:53.179575 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.179686 kubelet[1926]: E1213 04:03:53.179619 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.180135 kubelet[1926]: E1213 04:03:53.179936 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.180135 kubelet[1926]: W1213 04:03:53.179950 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.180135 kubelet[1926]: E1213 04:03:53.179986 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.170000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.170000 audit: BPF prog-id=120 op=LOAD Dec 13 04:03:53.170000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c000390968 items=0 ppid=2340 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.181175 kubelet[1926]: E1213 04:03:53.181006 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.181175 kubelet[1926]: W1213 04:03:53.181019 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.181175 kubelet[1926]: E1213 04:03:53.181050 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636534326132363936623764613764336634666666353732636563 Dec 13 04:03:53.180000 audit: BPF prog-id=120 op=UNLOAD Dec 13 04:03:53.180000 audit: BPF prog-id=119 op=UNLOAD Dec 13 04:03:53.181680 kubelet[1926]: E1213 04:03:53.181591 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.181680 kubelet[1926]: W1213 04:03:53.181602 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.181680 kubelet[1926]: E1213 04:03:53.181621 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.181843 kubelet[1926]: E1213 04:03:53.181813 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.181843 kubelet[1926]: W1213 04:03:53.181824 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.181843 kubelet[1926]: E1213 04:03:53.181842 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.181000 audit: BPF prog-id=121 op=LOAD Dec 13 04:03:53.182989 kubelet[1926]: E1213 04:03:53.182438 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.182989 kubelet[1926]: W1213 04:03:53.182448 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.182989 kubelet[1926]: E1213 04:03:53.182458 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.181000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c000390d78 items=0 ppid=2340 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.181000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937636534326132363936623764613764336634666666353732636563 Dec 13 04:03:53.184030 kubelet[1926]: E1213 04:03:53.183212 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.184030 kubelet[1926]: W1213 04:03:53.183245 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.184030 kubelet[1926]: E1213 04:03:53.183257 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.208183 env[1147]: time="2024-12-13T04:03:53.208124527Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-d4mzn,Uid:716b4e6c-1d46-4e95-b2a2-debd1c4f582e,Namespace:calico-system,Attempt:0,} returns sandbox id \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\"" Dec 13 04:03:53.209826 kubelet[1926]: E1213 04:03:53.209783 1926 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 04:03:53.209970 kubelet[1926]: W1213 04:03:53.209956 1926 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 04:03:53.210044 kubelet[1926]: E1213 04:03:53.210031 1926 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 04:03:53.210301 env[1147]: time="2024-12-13T04:03:53.210238154Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 04:03:53.220923 env[1147]: time="2024-12-13T04:03:53.220404681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:03:53.220923 env[1147]: time="2024-12-13T04:03:53.220478750Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:03:53.220923 env[1147]: time="2024-12-13T04:03:53.220495661Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:03:53.220923 env[1147]: time="2024-12-13T04:03:53.220703633Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/16dd84376657d4cc389a22d7c5f09624e1159e70121aea23471c3701769efc2a pid=2410 runtime=io.containerd.runc.v2 Dec 13 04:03:53.234734 systemd[1]: Started cri-containerd-16dd84376657d4cc389a22d7c5f09624e1159e70121aea23471c3701769efc2a.scope. Dec 13 04:03:53.270000 audit[2438]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:53.270000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc37b79230 a2=0 a3=7ffc37b7921c items=0 ppid=2020 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:53.275000 audit[2438]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2438 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:03:53.275000 audit[2438]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc37b79230 a2=0 a3=0 items=0 ppid=2020 pid=2438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.275000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.276000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.277000 audit: BPF prog-id=122 op=LOAD Dec 13 04:03:53.277000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.277000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.277000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136646438343337363635376434636333383961323264376335663039 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136646438343337363635376434636333383961323264376335663039 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.278000 audit: BPF prog-id=123 op=LOAD Dec 13 04:03:53.278000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024430 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136646438343337363635376434636333383961323264376335663039 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.280000 audit: BPF prog-id=124 op=LOAD Dec 13 04:03:53.280000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024478 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136646438343337363635376434636333383961323264376335663039 Dec 13 04:03:53.281000 audit: BPF prog-id=124 op=UNLOAD Dec 13 04:03:53.281000 audit: BPF prog-id=123 op=UNLOAD Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { perfmon } for pid=2421 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit[2421]: AVC avc: denied { bpf } for pid=2421 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:53.281000 audit: BPF prog-id=125 op=LOAD Dec 13 04:03:53.281000 audit[2421]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024888 items=0 ppid=2410 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:53.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136646438343337363635376434636333383961323264376335663039 Dec 13 04:03:53.338678 env[1147]: time="2024-12-13T04:03:53.338560708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b5dfd4ff-f95cd,Uid:1ab4f8d2-dd1c-4f8b-adda-0e7158a8197b,Namespace:calico-system,Attempt:0,} returns sandbox id \"16dd84376657d4cc389a22d7c5f09624e1159e70121aea23471c3701769efc2a\"" Dec 13 04:03:54.936695 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1912649629.mount: Deactivated successfully. Dec 13 04:03:55.079006 kubelet[1926]: E1213 04:03:55.078937 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:03:55.182377 env[1147]: time="2024-12-13T04:03:55.182305085Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:55.185042 env[1147]: time="2024-12-13T04:03:55.184970797Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:55.187487 env[1147]: time="2024-12-13T04:03:55.187222081Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:55.189664 env[1147]: time="2024-12-13T04:03:55.189612436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:55.191007 env[1147]: time="2024-12-13T04:03:55.190959994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 04:03:55.197031 env[1147]: time="2024-12-13T04:03:55.195377353Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 04:03:55.197031 env[1147]: time="2024-12-13T04:03:55.196494890Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 04:03:55.215201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3928055057.mount: Deactivated successfully. Dec 13 04:03:55.231338 env[1147]: time="2024-12-13T04:03:55.231196132Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce\"" Dec 13 04:03:55.233977 env[1147]: time="2024-12-13T04:03:55.233918630Z" level=info msg="StartContainer for \"566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce\"" Dec 13 04:03:55.279651 systemd[1]: Started cri-containerd-566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce.scope. Dec 13 04:03:55.309526 kernel: kauditd_printk_skb: 184 callbacks suppressed Dec 13 04:03:55.309709 kernel: audit: type=1400 audit(1734062635.298:986): avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.309757 kernel: audit: type=1300 audit(1734062635.298:986): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f298d092c38 items=0 ppid=2340 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f298d092c38 items=0 ppid=2340 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:55.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536366239326331623134323364653132653365316333383835396138 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.318588 kernel: audit: type=1327 audit(1734062635.298:986): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536366239326331623134323364653132653365316333383835396138 Dec 13 04:03:55.318644 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.322223 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.330632 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.330759 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.338087 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.338172 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.341443 kernel: audit: type=1400 audit(1734062635.298:987): avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.298000 audit: BPF prog-id=126 op=LOAD Dec 13 04:03:55.298000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000386608 items=0 ppid=2340 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:55.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536366239326331623134323364653132653365316333383835396138 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.300000 audit: BPF prog-id=127 op=LOAD Dec 13 04:03:55.300000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000386658 items=0 ppid=2340 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:55.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536366239326331623134323364653132653365316333383835396138 Dec 13 04:03:55.308000 audit: BPF prog-id=127 op=UNLOAD Dec 13 04:03:55.308000 audit: BPF prog-id=126 op=UNLOAD Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:55.308000 audit: BPF prog-id=128 op=LOAD Dec 13 04:03:55.308000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003866e8 items=0 ppid=2340 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:55.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536366239326331623134323364653132653365316333383835396138 Dec 13 04:03:55.346370 env[1147]: time="2024-12-13T04:03:55.346318201Z" level=info msg="StartContainer for \"566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce\" returns successfully" Dec 13 04:03:55.358226 systemd[1]: cri-containerd-566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce.scope: Deactivated successfully. Dec 13 04:03:55.359000 audit: BPF prog-id=128 op=UNLOAD Dec 13 04:03:55.565014 env[1147]: time="2024-12-13T04:03:55.564893317Z" level=info msg="shim disconnected" id=566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce Dec 13 04:03:55.565519 env[1147]: time="2024-12-13T04:03:55.565451174Z" level=warning msg="cleaning up after shim disconnected" id=566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce namespace=k8s.io Dec 13 04:03:55.565698 env[1147]: time="2024-12-13T04:03:55.565664644Z" level=info msg="cleaning up dead shim" Dec 13 04:03:55.586632 env[1147]: time="2024-12-13T04:03:55.586564901Z" level=warning msg="cleanup warnings time=\"2024-12-13T04:03:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2491 runtime=io.containerd.runc.v2\n" Dec 13 04:03:55.858398 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-566b92c1b1423de12e3e1c38859a8651f66cedab152e5ebfc424931e3e10ecce-rootfs.mount: Deactivated successfully. Dec 13 04:03:57.078907 kubelet[1926]: E1213 04:03:57.078460 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:03:58.765275 env[1147]: time="2024-12-13T04:03:58.764407193Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:58.771291 env[1147]: time="2024-12-13T04:03:58.771227789Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:58.773695 env[1147]: time="2024-12-13T04:03:58.773642110Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:58.776103 env[1147]: time="2024-12-13T04:03:58.775978213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:03:58.777208 env[1147]: time="2024-12-13T04:03:58.776701229Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 04:03:58.779818 env[1147]: time="2024-12-13T04:03:58.779034627Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 04:03:58.800994 env[1147]: time="2024-12-13T04:03:58.800957679Z" level=info msg="CreateContainer within sandbox \"16dd84376657d4cc389a22d7c5f09624e1159e70121aea23471c3701769efc2a\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 04:03:58.820285 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2328235524.mount: Deactivated successfully. Dec 13 04:03:58.828529 env[1147]: time="2024-12-13T04:03:58.828491629Z" level=info msg="CreateContainer within sandbox \"16dd84376657d4cc389a22d7c5f09624e1159e70121aea23471c3701769efc2a\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ced445fcbde74ebed297f24b02db07ff12d92a0e3a6ac2f047296882e96651ba\"" Dec 13 04:03:58.829399 env[1147]: time="2024-12-13T04:03:58.829375507Z" level=info msg="StartContainer for \"ced445fcbde74ebed297f24b02db07ff12d92a0e3a6ac2f047296882e96651ba\"" Dec 13 04:03:58.859230 systemd[1]: Started cri-containerd-ced445fcbde74ebed297f24b02db07ff12d92a0e3a6ac2f047296882e96651ba.scope. Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.882000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.882000 audit: BPF prog-id=129 op=LOAD Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2410 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:58.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643434356663626465373465626564323937663234623032646230 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2410 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:58.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643434356663626465373465626564323937663234623032646230 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit: BPF prog-id=130 op=LOAD Dec 13 04:03:58.883000 audit[2520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020b290 items=0 ppid=2410 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:58.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643434356663626465373465626564323937663234623032646230 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.883000 audit: BPF prog-id=131 op=LOAD Dec 13 04:03:58.883000 audit[2520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020b2d8 items=0 ppid=2410 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:58.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643434356663626465373465626564323937663234623032646230 Dec 13 04:03:58.884000 audit: BPF prog-id=131 op=UNLOAD Dec 13 04:03:58.884000 audit: BPF prog-id=130 op=UNLOAD Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { perfmon } for pid=2520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit[2520]: AVC avc: denied { bpf } for pid=2520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:03:58.884000 audit: BPF prog-id=132 op=LOAD Dec 13 04:03:58.884000 audit[2520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020b6e8 items=0 ppid=2410 pid=2520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:03:58.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365643434356663626465373465626564323937663234623032646230 Dec 13 04:03:58.925216 env[1147]: time="2024-12-13T04:03:58.924723209Z" level=info msg="StartContainer for \"ced445fcbde74ebed297f24b02db07ff12d92a0e3a6ac2f047296882e96651ba\" returns successfully" Dec 13 04:03:59.079055 kubelet[1926]: E1213 04:03:59.078921 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:00.620447 kubelet[1926]: I1213 04:04:00.619858 1926 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 04:04:01.080885 kubelet[1926]: E1213 04:04:01.079315 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:03.080103 kubelet[1926]: E1213 04:04:03.078173 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:05.080207 kubelet[1926]: E1213 04:04:05.080108 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:06.923454 env[1147]: time="2024-12-13T04:04:06.923163728Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:06.932230 env[1147]: time="2024-12-13T04:04:06.932049399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:06.936572 env[1147]: time="2024-12-13T04:04:06.936513239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:06.941961 env[1147]: time="2024-12-13T04:04:06.941900229Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:06.944730 env[1147]: time="2024-12-13T04:04:06.944043037Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 04:04:06.951454 env[1147]: time="2024-12-13T04:04:06.951370495Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 04:04:06.986037 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1994671935.mount: Deactivated successfully. Dec 13 04:04:06.998858 env[1147]: time="2024-12-13T04:04:06.998721389Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b\"" Dec 13 04:04:07.003685 env[1147]: time="2024-12-13T04:04:07.002432013Z" level=info msg="StartContainer for \"9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b\"" Dec 13 04:04:07.055612 systemd[1]: Started cri-containerd-9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b.scope. Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.078135 kernel: kauditd_printk_skb: 91 callbacks suppressed Dec 13 04:04:07.078209 kernel: audit: type=1400 audit(1734062647.076:1011): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f5841cc14f8 items=0 ppid=2340 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:07.086327 kernel: audit: type=1300 audit(1734062647.076:1011): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f5841cc14f8 items=0 ppid=2340 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:07.086380 kernel: audit: type=1327 audit(1734062647.076:1011): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363832616362303165366539353766623734653531663064653435 Dec 13 04:04:07.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363832616362303165366539353766623734653531663064653435 Dec 13 04:04:07.093598 kubelet[1926]: E1213 04:04:07.093514 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.099818 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.105802 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.113936 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.114053 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.114086 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.120840 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.125475 kernel: audit: type=1400 audit(1734062647.076:1012): avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.076000 audit: BPF prog-id=133 op=LOAD Dec 13 04:04:07.076000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000308208 items=0 ppid=2340 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:07.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363832616362303165366539353766623734653531663064653435 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.080000 audit: BPF prog-id=134 op=LOAD Dec 13 04:04:07.080000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000308258 items=0 ppid=2340 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:07.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363832616362303165366539353766623734653531663064653435 Dec 13 04:04:07.090000 audit: BPF prog-id=134 op=UNLOAD Dec 13 04:04:07.090000 audit: BPF prog-id=133 op=UNLOAD Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { perfmon } for pid=2557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit[2557]: AVC avc: denied { bpf } for pid=2557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:07.090000 audit: BPF prog-id=135 op=LOAD Dec 13 04:04:07.090000 audit[2557]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003082e8 items=0 ppid=2340 pid=2557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:07.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963363832616362303165366539353766623734653531663064653435 Dec 13 04:04:07.127859 env[1147]: time="2024-12-13T04:04:07.127813498Z" level=info msg="StartContainer for \"9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b\" returns successfully" Dec 13 04:04:07.935877 kubelet[1926]: I1213 04:04:07.935714 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-54b5dfd4ff-f95cd" podStartSLOduration=10.502140413 podStartE2EDuration="15.935649673s" podCreationTimestamp="2024-12-13 04:03:52 +0000 UTC" firstStartedPulling="2024-12-13 04:03:53.344508309 +0000 UTC m=+14.487482579" lastFinishedPulling="2024-12-13 04:03:58.778017569 +0000 UTC m=+19.920991839" observedRunningTime="2024-12-13 04:03:59.847567477 +0000 UTC m=+20.990541807" watchObservedRunningTime="2024-12-13 04:04:07.935649673 +0000 UTC m=+29.078623993" Dec 13 04:04:09.079435 kubelet[1926]: E1213 04:04:09.079368 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:09.176752 systemd[1]: cri-containerd-9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b.scope: Deactivated successfully. Dec 13 04:04:09.179000 audit: BPF prog-id=135 op=UNLOAD Dec 13 04:04:09.215242 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b-rootfs.mount: Deactivated successfully. Dec 13 04:04:09.266045 kubelet[1926]: I1213 04:04:09.265504 1926 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 04:04:09.375083 env[1147]: time="2024-12-13T04:04:09.374830375Z" level=info msg="shim disconnected" id=9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b Dec 13 04:04:09.376663 env[1147]: time="2024-12-13T04:04:09.376586295Z" level=warning msg="cleaning up after shim disconnected" id=9c682acb01e6e957fb74e51f0de4557aab8533fb9b8d8cab5ad27f27f9254b9b namespace=k8s.io Dec 13 04:04:09.377026 env[1147]: time="2024-12-13T04:04:09.376954022Z" level=info msg="cleaning up dead shim" Dec 13 04:04:09.402401 env[1147]: time="2024-12-13T04:04:09.402276125Z" level=warning msg="cleanup warnings time=\"2024-12-13T04:04:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2598 runtime=io.containerd.runc.v2\n" Dec 13 04:04:09.446794 systemd[1]: Created slice kubepods-burstable-pod05f405fc_50fb_4f02_9ce2_d06cefea988c.slice. Dec 13 04:04:09.463892 kubelet[1926]: W1213 04:04:09.463816 1926 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510-3-6-b-9ccf4f3b90.novalocal" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510-3-6-b-9ccf4f3b90.novalocal' and this object Dec 13 04:04:09.463892 kubelet[1926]: E1213 04:04:09.463891 1926 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:ci-3510-3-6-b-9ccf4f3b90.novalocal\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ci-3510-3-6-b-9ccf4f3b90.novalocal' and this object" logger="UnhandledError" Dec 13 04:04:09.472264 systemd[1]: Created slice kubepods-besteffort-pod4408bdef_bdcb_4b03_a17f_062e757020c1.slice. Dec 13 04:04:09.479163 systemd[1]: Created slice kubepods-besteffort-pod4b52d933_866c_4c1d_b57c_83fb51ac132b.slice. Dec 13 04:04:09.487524 systemd[1]: Created slice kubepods-besteffort-podae8d4ab6_29fd_4569_9b0f_d0fd8b6ebd3b.slice. Dec 13 04:04:09.493458 systemd[1]: Created slice kubepods-burstable-podec7d1cca_678c_407f_a5a9_b29e2444becf.slice. Dec 13 04:04:09.513914 kubelet[1926]: I1213 04:04:09.513876 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ec7d1cca-678c-407f-a5a9-b29e2444becf-config-volume\") pod \"coredns-6f6b679f8f-r9gwq\" (UID: \"ec7d1cca-678c-407f-a5a9-b29e2444becf\") " pod="kube-system/coredns-6f6b679f8f-r9gwq" Dec 13 04:04:09.514103 kubelet[1926]: I1213 04:04:09.513968 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lhjr2\" (UniqueName: \"kubernetes.io/projected/05f405fc-50fb-4f02-9ce2-d06cefea988c-kube-api-access-lhjr2\") pod \"coredns-6f6b679f8f-4htdt\" (UID: \"05f405fc-50fb-4f02-9ce2-d06cefea988c\") " pod="kube-system/coredns-6f6b679f8f-4htdt" Dec 13 04:04:09.514103 kubelet[1926]: I1213 04:04:09.514002 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/05f405fc-50fb-4f02-9ce2-d06cefea988c-config-volume\") pod \"coredns-6f6b679f8f-4htdt\" (UID: \"05f405fc-50fb-4f02-9ce2-d06cefea988c\") " pod="kube-system/coredns-6f6b679f8f-4htdt" Dec 13 04:04:09.514103 kubelet[1926]: I1213 04:04:09.514058 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v4ddc\" (UniqueName: \"kubernetes.io/projected/ec7d1cca-678c-407f-a5a9-b29e2444becf-kube-api-access-v4ddc\") pod \"coredns-6f6b679f8f-r9gwq\" (UID: \"ec7d1cca-678c-407f-a5a9-b29e2444becf\") " pod="kube-system/coredns-6f6b679f8f-r9gwq" Dec 13 04:04:09.514271 kubelet[1926]: I1213 04:04:09.514082 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvvd9\" (UniqueName: \"kubernetes.io/projected/4b52d933-866c-4c1d-b57c-83fb51ac132b-kube-api-access-tvvd9\") pod \"calico-apiserver-76b85ff8db-kplzx\" (UID: \"4b52d933-866c-4c1d-b57c-83fb51ac132b\") " pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" Dec 13 04:04:09.514271 kubelet[1926]: I1213 04:04:09.514149 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/4b52d933-866c-4c1d-b57c-83fb51ac132b-calico-apiserver-certs\") pod \"calico-apiserver-76b85ff8db-kplzx\" (UID: \"4b52d933-866c-4c1d-b57c-83fb51ac132b\") " pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" Dec 13 04:04:09.514271 kubelet[1926]: I1213 04:04:09.514171 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b-calico-apiserver-certs\") pod \"calico-apiserver-76b85ff8db-lnkts\" (UID: \"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b\") " pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" Dec 13 04:04:09.514271 kubelet[1926]: I1213 04:04:09.514229 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mp6tx\" (UniqueName: \"kubernetes.io/projected/4408bdef-bdcb-4b03-a17f-062e757020c1-kube-api-access-mp6tx\") pod \"calico-kube-controllers-79d4cbddb8-5gn6s\" (UID: \"4408bdef-bdcb-4b03-a17f-062e757020c1\") " pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:09.514271 kubelet[1926]: I1213 04:04:09.514250 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4408bdef-bdcb-4b03-a17f-062e757020c1-tigera-ca-bundle\") pod \"calico-kube-controllers-79d4cbddb8-5gn6s\" (UID: \"4408bdef-bdcb-4b03-a17f-062e757020c1\") " pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:09.514526 kubelet[1926]: I1213 04:04:09.514304 1926 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8w2hm\" (UniqueName: \"kubernetes.io/projected/ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b-kube-api-access-8w2hm\") pod \"calico-apiserver-76b85ff8db-lnkts\" (UID: \"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b\") " pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" Dec 13 04:04:09.685814 env[1147]: time="2024-12-13T04:04:09.682129339Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 04:04:09.778412 env[1147]: time="2024-12-13T04:04:09.778062850Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:0,}" Dec 13 04:04:09.784568 env[1147]: time="2024-12-13T04:04:09.784509822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-kplzx,Uid:4b52d933-866c-4c1d-b57c-83fb51ac132b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 04:04:09.793109 env[1147]: time="2024-12-13T04:04:09.793028792Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-lnkts,Uid:ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b,Namespace:calico-apiserver,Attempt:0,}" Dec 13 04:04:10.200559 env[1147]: time="2024-12-13T04:04:10.200493365Z" level=error msg="Failed to destroy network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.201095 env[1147]: time="2024-12-13T04:04:10.201064312Z" level=error msg="encountered an error cleaning up failed sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.201227 env[1147]: time="2024-12-13T04:04:10.201196318Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.201604 kubelet[1926]: E1213 04:04:10.201560 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.201893 kubelet[1926]: E1213 04:04:10.201642 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:10.201893 kubelet[1926]: E1213 04:04:10.201667 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:10.201893 kubelet[1926]: E1213 04:04:10.201718 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79d4cbddb8-5gn6s_calico-system(4408bdef-bdcb-4b03-a17f-062e757020c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79d4cbddb8-5gn6s_calico-system(4408bdef-bdcb-4b03-a17f-062e757020c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" podUID="4408bdef-bdcb-4b03-a17f-062e757020c1" Dec 13 04:04:10.237100 env[1147]: time="2024-12-13T04:04:10.237054196Z" level=error msg="Failed to destroy network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.239383 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38-shm.mount: Deactivated successfully. Dec 13 04:04:10.240679 env[1147]: time="2024-12-13T04:04:10.240640996Z" level=error msg="encountered an error cleaning up failed sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.240863 env[1147]: time="2024-12-13T04:04:10.240817415Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-lnkts,Uid:ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.241202 kubelet[1926]: E1213 04:04:10.241152 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.241273 kubelet[1926]: E1213 04:04:10.241226 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" Dec 13 04:04:10.241273 kubelet[1926]: E1213 04:04:10.241251 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" Dec 13 04:04:10.241345 kubelet[1926]: E1213 04:04:10.241301 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-76b85ff8db-lnkts_calico-apiserver(ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-76b85ff8db-lnkts_calico-apiserver(ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" podUID="ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b" Dec 13 04:04:10.246100 env[1147]: time="2024-12-13T04:04:10.246040111Z" level=error msg="Failed to destroy network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.248266 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f-shm.mount: Deactivated successfully. Dec 13 04:04:10.249429 env[1147]: time="2024-12-13T04:04:10.248939768Z" level=error msg="encountered an error cleaning up failed sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.249429 env[1147]: time="2024-12-13T04:04:10.249404726Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-kplzx,Uid:4b52d933-866c-4c1d-b57c-83fb51ac132b,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.250033 kubelet[1926]: E1213 04:04:10.249647 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.250033 kubelet[1926]: E1213 04:04:10.249726 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" Dec 13 04:04:10.250033 kubelet[1926]: E1213 04:04:10.249747 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" Dec 13 04:04:10.250211 kubelet[1926]: E1213 04:04:10.249826 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-76b85ff8db-kplzx_calico-apiserver(4b52d933-866c-4c1d-b57c-83fb51ac132b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-76b85ff8db-kplzx_calico-apiserver(4b52d933-866c-4c1d-b57c-83fb51ac132b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" podUID="4b52d933-866c-4c1d-b57c-83fb51ac132b" Dec 13 04:04:10.654380 env[1147]: time="2024-12-13T04:04:10.654290776Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4htdt,Uid:05f405fc-50fb-4f02-9ce2-d06cefea988c,Namespace:kube-system,Attempt:0,}" Dec 13 04:04:10.694988 kubelet[1926]: I1213 04:04:10.693351 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:10.699580 env[1147]: time="2024-12-13T04:04:10.699524037Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:10.702575 env[1147]: time="2024-12-13T04:04:10.702487413Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-r9gwq,Uid:ec7d1cca-678c-407f-a5a9-b29e2444becf,Namespace:kube-system,Attempt:0,}" Dec 13 04:04:10.708225 kubelet[1926]: I1213 04:04:10.708051 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:10.710073 env[1147]: time="2024-12-13T04:04:10.709968236Z" level=info msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" Dec 13 04:04:10.719690 kubelet[1926]: I1213 04:04:10.719482 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:10.729370 env[1147]: time="2024-12-13T04:04:10.729299534Z" level=info msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" Dec 13 04:04:10.858913 env[1147]: time="2024-12-13T04:04:10.858855901Z" level=error msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" failed" error="failed to destroy network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.859344 kubelet[1926]: E1213 04:04:10.859301 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:10.859461 kubelet[1926]: E1213 04:04:10.859383 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9"} Dec 13 04:04:10.859519 kubelet[1926]: E1213 04:04:10.859479 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4408bdef-bdcb-4b03-a17f-062e757020c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:10.859645 kubelet[1926]: E1213 04:04:10.859525 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4408bdef-bdcb-4b03-a17f-062e757020c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" podUID="4408bdef-bdcb-4b03-a17f-062e757020c1" Dec 13 04:04:10.863707 env[1147]: time="2024-12-13T04:04:10.863633866Z" level=error msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" failed" error="failed to destroy network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.864271 kubelet[1926]: E1213 04:04:10.864060 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:10.864271 kubelet[1926]: E1213 04:04:10.864151 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f"} Dec 13 04:04:10.864271 kubelet[1926]: E1213 04:04:10.864195 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4b52d933-866c-4c1d-b57c-83fb51ac132b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:10.864271 kubelet[1926]: E1213 04:04:10.864237 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4b52d933-866c-4c1d-b57c-83fb51ac132b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" podUID="4b52d933-866c-4c1d-b57c-83fb51ac132b" Dec 13 04:04:10.864663 env[1147]: time="2024-12-13T04:04:10.864627712Z" level=error msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" failed" error="failed to destroy network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.864984 kubelet[1926]: E1213 04:04:10.864943 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:10.865072 kubelet[1926]: E1213 04:04:10.864995 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38"} Dec 13 04:04:10.865072 kubelet[1926]: E1213 04:04:10.865047 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:10.865166 kubelet[1926]: E1213 04:04:10.865100 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" podUID="ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b" Dec 13 04:04:10.872515 env[1147]: time="2024-12-13T04:04:10.872460843Z" level=error msg="Failed to destroy network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.873041 env[1147]: time="2024-12-13T04:04:10.873010630Z" level=error msg="encountered an error cleaning up failed sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.873175 env[1147]: time="2024-12-13T04:04:10.873144510Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4htdt,Uid:05f405fc-50fb-4f02-9ce2-d06cefea988c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.874395 kubelet[1926]: E1213 04:04:10.873391 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.874395 kubelet[1926]: E1213 04:04:10.873450 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4htdt" Dec 13 04:04:10.874395 kubelet[1926]: E1213 04:04:10.873481 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-4htdt" Dec 13 04:04:10.874585 kubelet[1926]: E1213 04:04:10.873544 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-4htdt_kube-system(05f405fc-50fb-4f02-9ce2-d06cefea988c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-4htdt_kube-system(05f405fc-50fb-4f02-9ce2-d06cefea988c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4htdt" podUID="05f405fc-50fb-4f02-9ce2-d06cefea988c" Dec 13 04:04:10.896080 env[1147]: time="2024-12-13T04:04:10.896023395Z" level=error msg="Failed to destroy network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.896597 env[1147]: time="2024-12-13T04:04:10.896564506Z" level=error msg="encountered an error cleaning up failed sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.896731 env[1147]: time="2024-12-13T04:04:10.896700340Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-r9gwq,Uid:ec7d1cca-678c-407f-a5a9-b29e2444becf,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.898163 kubelet[1926]: E1213 04:04:10.897068 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:10.898163 kubelet[1926]: E1213 04:04:10.897129 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-r9gwq" Dec 13 04:04:10.898163 kubelet[1926]: E1213 04:04:10.897156 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-r9gwq" Dec 13 04:04:10.898337 kubelet[1926]: E1213 04:04:10.897217 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-r9gwq_kube-system(ec7d1cca-678c-407f-a5a9-b29e2444becf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-r9gwq_kube-system(ec7d1cca-678c-407f-a5a9-b29e2444becf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-r9gwq" podUID="ec7d1cca-678c-407f-a5a9-b29e2444becf" Dec 13 04:04:11.090322 systemd[1]: Created slice kubepods-besteffort-pod02dbc368_79f2_4a05_bc9e_bb995dd7d205.slice. Dec 13 04:04:11.097804 env[1147]: time="2024-12-13T04:04:11.097701346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c4vc5,Uid:02dbc368-79f2-4a05-bc9e-bb995dd7d205,Namespace:calico-system,Attempt:0,}" Dec 13 04:04:11.219178 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67-shm.mount: Deactivated successfully. Dec 13 04:04:11.240816 env[1147]: time="2024-12-13T04:04:11.240687919Z" level=error msg="Failed to destroy network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:11.243891 env[1147]: time="2024-12-13T04:04:11.241133070Z" level=error msg="encountered an error cleaning up failed sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:11.243891 env[1147]: time="2024-12-13T04:04:11.241182994Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c4vc5,Uid:02dbc368-79f2-4a05-bc9e-bb995dd7d205,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:11.243118 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699-shm.mount: Deactivated successfully. Dec 13 04:04:11.244365 kubelet[1926]: E1213 04:04:11.241935 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:11.244365 kubelet[1926]: E1213 04:04:11.241992 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:04:11.244365 kubelet[1926]: E1213 04:04:11.242016 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-c4vc5" Dec 13 04:04:11.244624 kubelet[1926]: E1213 04:04:11.242058 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-c4vc5_calico-system(02dbc368-79f2-4a05-bc9e-bb995dd7d205)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-c4vc5_calico-system(02dbc368-79f2-4a05-bc9e-bb995dd7d205)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:11.724188 kubelet[1926]: I1213 04:04:11.724111 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:11.728754 env[1147]: time="2024-12-13T04:04:11.728689672Z" level=info msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" Dec 13 04:04:11.750113 kubelet[1926]: I1213 04:04:11.750067 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:11.754900 env[1147]: time="2024-12-13T04:04:11.754730058Z" level=info msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" Dec 13 04:04:11.767156 kubelet[1926]: I1213 04:04:11.765039 1926 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:11.773800 env[1147]: time="2024-12-13T04:04:11.768502136Z" level=info msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" Dec 13 04:04:12.124644 env[1147]: time="2024-12-13T04:04:12.124584658Z" level=error msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" failed" error="failed to destroy network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:12.125606 kubelet[1926]: E1213 04:04:12.125139 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:12.125606 kubelet[1926]: E1213 04:04:12.125279 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67"} Dec 13 04:04:12.125606 kubelet[1926]: E1213 04:04:12.125371 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"05f405fc-50fb-4f02-9ce2-d06cefea988c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:12.125606 kubelet[1926]: E1213 04:04:12.125465 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"05f405fc-50fb-4f02-9ce2-d06cefea988c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-4htdt" podUID="05f405fc-50fb-4f02-9ce2-d06cefea988c" Dec 13 04:04:12.130351 env[1147]: time="2024-12-13T04:04:12.130283675Z" level=error msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" failed" error="failed to destroy network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:12.130746 kubelet[1926]: E1213 04:04:12.130701 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:12.130899 kubelet[1926]: E1213 04:04:12.130760 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933"} Dec 13 04:04:12.130899 kubelet[1926]: E1213 04:04:12.130821 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ec7d1cca-678c-407f-a5a9-b29e2444becf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:12.130899 kubelet[1926]: E1213 04:04:12.130850 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ec7d1cca-678c-407f-a5a9-b29e2444becf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-r9gwq" podUID="ec7d1cca-678c-407f-a5a9-b29e2444becf" Dec 13 04:04:12.131305 env[1147]: time="2024-12-13T04:04:12.131269727Z" level=error msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" failed" error="failed to destroy network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 04:04:12.131749 kubelet[1926]: E1213 04:04:12.131557 1926 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:12.131749 kubelet[1926]: E1213 04:04:12.131626 1926 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699"} Dec 13 04:04:12.131749 kubelet[1926]: E1213 04:04:12.131666 1926 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 04:04:12.131749 kubelet[1926]: E1213 04:04:12.131719 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"02dbc368-79f2-4a05-bc9e-bb995dd7d205\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-c4vc5" podUID="02dbc368-79f2-4a05-bc9e-bb995dd7d205" Dec 13 04:04:21.736212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2690424350.mount: Deactivated successfully. Dec 13 04:04:21.811744 env[1147]: time="2024-12-13T04:04:21.811680778Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:21.814880 env[1147]: time="2024-12-13T04:04:21.814852720Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:21.819910 env[1147]: time="2024-12-13T04:04:21.819885971Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:21.821648 env[1147]: time="2024-12-13T04:04:21.821625083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:21.822124 env[1147]: time="2024-12-13T04:04:21.822099511Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 04:04:21.856681 env[1147]: time="2024-12-13T04:04:21.856596134Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 04:04:21.912046 env[1147]: time="2024-12-13T04:04:21.911989482Z" level=info msg="CreateContainer within sandbox \"97ce42a2696b7da7d3f4fff572cec03a36f86d050234d6ceb6263a7815eca2ad\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1\"" Dec 13 04:04:21.913943 env[1147]: time="2024-12-13T04:04:21.913916746Z" level=info msg="StartContainer for \"3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1\"" Dec 13 04:04:21.940051 systemd[1]: Started cri-containerd-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1.scope. Dec 13 04:04:21.977758 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 04:04:21.983697 kernel: audit: type=1400 audit(1734062661.971:1018): avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.988698 kernel: audit: type=1300 audit(1734062661.971:1018): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f7029c912f8 items=0 ppid=2340 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:21.988744 kernel: audit: type=1327 audit(1734062661.971:1018): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330303462356666653038393436373761323537616430646631363361 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7f7029c912f8 items=0 ppid=2340 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:21.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330303462356666653038393436373761323537616430646631363361 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.998801 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.005884 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.011830 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.019590 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.019695 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.023838 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:22.024434 kernel: audit: type=1400 audit(1734062661.971:1019): avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.971000 audit: BPF prog-id=136 op=LOAD Dec 13 04:04:21.971000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000024b08 items=0 ppid=2340 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:21.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330303462356666653038393436373761323537616430646631363361 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.972000 audit: BPF prog-id=137 op=LOAD Dec 13 04:04:21.972000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c000024b58 items=0 ppid=2340 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:21.972000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330303462356666653038393436373761323537616430646631363361 Dec 13 04:04:21.977000 audit: BPF prog-id=137 op=UNLOAD Dec 13 04:04:21.977000 audit: BPF prog-id=136 op=UNLOAD Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { perfmon } for pid=2937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit[2937]: AVC avc: denied { bpf } for pid=2937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:21.977000 audit: BPF prog-id=138 op=LOAD Dec 13 04:04:21.977000 audit[2937]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000024be8 items=0 ppid=2340 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:21.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330303462356666653038393436373761323537616430646631363361 Dec 13 04:04:22.052413 env[1147]: time="2024-12-13T04:04:22.052358440Z" level=info msg="StartContainer for \"3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1\" returns successfully" Dec 13 04:04:22.212848 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 04:04:22.213065 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 04:04:22.889299 systemd[1]: run-containerd-runc-k8s.io-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1-runc.dSYXMR.mount: Deactivated successfully. Dec 13 04:04:22.950738 kubelet[1926]: I1213 04:04:22.950681 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-d4mzn" podStartSLOduration=2.323657927 podStartE2EDuration="30.937060799s" podCreationTimestamp="2024-12-13 04:03:52 +0000 UTC" firstStartedPulling="2024-12-13 04:03:53.209598374 +0000 UTC m=+14.352572644" lastFinishedPulling="2024-12-13 04:04:21.823001246 +0000 UTC m=+42.965975516" observedRunningTime="2024-12-13 04:04:22.935656553 +0000 UTC m=+44.078630823" watchObservedRunningTime="2024-12-13 04:04:22.937060799 +0000 UTC m=+44.080035079" Dec 13 04:04:22.958070 kubelet[1926]: I1213 04:04:22.958039 1926 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 04:04:23.081717 env[1147]: time="2024-12-13T04:04:23.080692302Z" level=info msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" Dec 13 04:04:23.081717 env[1147]: time="2024-12-13T04:04:23.081290080Z" level=info msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" Dec 13 04:04:23.081717 env[1147]: time="2024-12-13T04:04:23.081505173Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:23.137000 audit[3069]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:23.137000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe7a288370 a2=0 a3=7ffe7a28835c items=0 ppid=2020 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.137000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:23.142000 audit[3069]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3069 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:23.142000 audit[3069]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe7a288370 a2=0 a3=7ffe7a28835c items=0 ppid=2020 pid=3069 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.142000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:23.866099 systemd[1]: run-containerd-runc-k8s.io-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1-runc.TDNsEZ.mount: Deactivated successfully. Dec 13 04:04:23.882000 audit[3117]: AVC avc: denied { write } for pid=3117 comm="tee" name="fd" dev="proc" ino=25931 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.882000 audit[3117]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffccc3489ed a2=241 a3=1b6 items=1 ppid=3103 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.882000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 04:04:23.882000 audit: PATH item=0 name="/dev/fd/63" inode=25900 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.882000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.949000 audit[3157]: AVC avc: denied { write } for pid=3157 comm="tee" name="fd" dev="proc" ino=25144 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.949000 audit[3157]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9e4409fc a2=241 a3=1b6 items=1 ppid=3100 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.952000 audit[3162]: AVC avc: denied { write } for pid=3162 comm="tee" name="fd" dev="proc" ino=25149 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.952000 audit[3162]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd85a809fc a2=241 a3=1b6 items=1 ppid=3109 pid=3162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.952000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 04:04:23.952000 audit: PATH item=0 name="/dev/fd/63" inode=25125 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.953000 audit[3170]: AVC avc: denied { write } for pid=3170 comm="tee" name="fd" dev="proc" ino=25960 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.953000 audit[3170]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc4aa2c9ec a2=241 a3=1b6 items=1 ppid=3106 pid=3170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.953000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 04:04:23.953000 audit: PATH item=0 name="/dev/fd/63" inode=25134 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.953000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.952000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.949000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 04:04:23.949000 audit: PATH item=0 name="/dev/fd/63" inode=25957 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.949000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.963000 audit[3178]: AVC avc: denied { write } for pid=3178 comm="tee" name="fd" dev="proc" ino=25964 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.964000 audit[3184]: AVC avc: denied { write } for pid=3184 comm="tee" name="fd" dev="proc" ino=25967 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.964000 audit[3184]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe70a39fc a2=241 a3=1b6 items=1 ppid=3105 pid=3184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.963000 audit[3178]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca56559fd a2=241 a3=1b6 items=1 ppid=3119 pid=3178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.963000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 04:04:23.963000 audit: PATH item=0 name="/dev/fd/63" inode=25139 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.963000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.973000 audit[3188]: AVC avc: denied { write } for pid=3188 comm="tee" name="fd" dev="proc" ino=25972 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 04:04:23.964000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 04:04:23.964000 audit: PATH item=0 name="/dev/fd/63" inode=25146 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.964000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:23.973000 audit[3188]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7055c9fe a2=241 a3=1b6 items=1 ppid=3141 pid=3188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:23.973000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 04:04:23.973000 audit: PATH item=0 name="/dev/fd/63" inode=25153 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 04:04:23.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 04:04:24.079549 env[1147]: time="2024-12-13T04:04:24.079500604Z" level=info msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" Dec 13 04:04:24.079999 env[1147]: time="2024-12-13T04:04:24.079971134Z" level=info msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.261 [INFO][3054] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.261 [INFO][3054] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" iface="eth0" netns="/var/run/netns/cni-d264e401-a460-bd97-374f-51b476f193d9" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.262 [INFO][3054] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" iface="eth0" netns="/var/run/netns/cni-d264e401-a460-bd97-374f-51b476f193d9" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.262 [INFO][3054] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" iface="eth0" netns="/var/run/netns/cni-d264e401-a460-bd97-374f-51b476f193d9" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.262 [INFO][3054] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:23.262 [INFO][3054] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.260 [INFO][3079] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.264 [INFO][3079] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.264 [INFO][3079] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.284 [WARNING][3079] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.284 [INFO][3079] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.287 [INFO][3079] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.297906 env[1147]: 2024-12-13 04:04:24.290 [INFO][3054] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:24.301843 env[1147]: time="2024-12-13T04:04:24.300589324Z" level=info msg="TearDown network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" successfully" Dec 13 04:04:24.301843 env[1147]: time="2024-12-13T04:04:24.300627055Z" level=info msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" returns successfully" Dec 13 04:04:24.301133 systemd[1]: run-netns-cni\x2dd264e401\x2da460\x2dbd97\x2d374f\x2d51b476f193d9.mount: Deactivated successfully. Dec 13 04:04:24.303107 env[1147]: time="2024-12-13T04:04:24.303074101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-kplzx,Uid:4b52d933-866c-4c1d-b57c-83fb51ac132b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.233 [INFO][3062] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.234 [INFO][3062] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" iface="eth0" netns="/var/run/netns/cni-085a9c33-b3c7-93f7-d6d3-bd1c376e3a89" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.234 [INFO][3062] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" iface="eth0" netns="/var/run/netns/cni-085a9c33-b3c7-93f7-d6d3-bd1c376e3a89" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.236 [INFO][3062] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" iface="eth0" netns="/var/run/netns/cni-085a9c33-b3c7-93f7-d6d3-bd1c376e3a89" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.236 [INFO][3062] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:23.236 [INFO][3062] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.272 [INFO][3077] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.273 [INFO][3077] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.288 [INFO][3077] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.309 [WARNING][3077] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.309 [INFO][3077] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.311 [INFO][3077] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.319684 env[1147]: 2024-12-13 04:04:24.317 [INFO][3062] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:24.326079 env[1147]: time="2024-12-13T04:04:24.322364069Z" level=info msg="TearDown network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" successfully" Dec 13 04:04:24.326079 env[1147]: time="2024-12-13T04:04:24.322397091Z" level=info msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" returns successfully" Dec 13 04:04:24.326079 env[1147]: time="2024-12-13T04:04:24.323860888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-r9gwq,Uid:ec7d1cca-678c-407f-a5a9-b29e2444becf,Namespace:kube-system,Attempt:1,}" Dec 13 04:04:24.322413 systemd[1]: run-netns-cni\x2d085a9c33\x2db3c7\x2d93f7\x2dd6d3\x2dbd1c376e3a89.mount: Deactivated successfully. Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.239 [INFO][3058] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.239 [INFO][3058] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="/var/run/netns/cni-d9c65f06-fcbe-57d4-d0f7-6d7dc815b9ee" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.239 [INFO][3058] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="/var/run/netns/cni-d9c65f06-fcbe-57d4-d0f7-6d7dc815b9ee" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.239 [INFO][3058] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="/var/run/netns/cni-d9c65f06-fcbe-57d4-d0f7-6d7dc815b9ee" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.240 [INFO][3058] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:23.240 [INFO][3058] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.274 [INFO][3078] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.275 [INFO][3078] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.311 [INFO][3078] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.325 [WARNING][3078] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.325 [INFO][3078] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.329 [INFO][3078] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.344394 env[1147]: 2024-12-13 04:04:24.336 [INFO][3058] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:24.348252 env[1147]: time="2024-12-13T04:04:24.346869761Z" level=info msg="TearDown network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" successfully" Dec 13 04:04:24.348252 env[1147]: time="2024-12-13T04:04:24.346905649Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" returns successfully" Dec 13 04:04:24.347419 systemd[1]: run-netns-cni\x2dd9c65f06\x2dfcbe\x2d57d4\x2dd0f7\x2d6d7dc815b9ee.mount: Deactivated successfully. Dec 13 04:04:24.348723 env[1147]: time="2024-12-13T04:04:24.348693132Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:1,}" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" iface="eth0" netns="/var/run/netns/cni-6e6f173b-93ff-932c-711d-0cd2a66d1bce" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" iface="eth0" netns="/var/run/netns/cni-6e6f173b-93ff-932c-711d-0cd2a66d1bce" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" iface="eth0" netns="/var/run/netns/cni-6e6f173b-93ff-932c-711d-0cd2a66d1bce" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.269 [INFO][3227] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.419 [INFO][3244] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.420 [INFO][3244] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.420 [INFO][3244] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.435 [WARNING][3244] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.435 [INFO][3244] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.445 [INFO][3244] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.458266 env[1147]: 2024-12-13 04:04:24.452 [INFO][3227] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:24.458266 env[1147]: time="2024-12-13T04:04:24.455289257Z" level=info msg="TearDown network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" successfully" Dec 13 04:04:24.458266 env[1147]: time="2024-12-13T04:04:24.455512064Z" level=info msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" returns successfully" Dec 13 04:04:24.461562 env[1147]: time="2024-12-13T04:04:24.460940347Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c4vc5,Uid:02dbc368-79f2-4a05-bc9e-bb995dd7d205,Namespace:calico-system,Attempt:1,}" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.249 [INFO][3221] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.249 [INFO][3221] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" iface="eth0" netns="/var/run/netns/cni-8209440a-5c1b-5d6a-548d-51dbe674fdbc" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.249 [INFO][3221] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" iface="eth0" netns="/var/run/netns/cni-8209440a-5c1b-5d6a-548d-51dbe674fdbc" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.249 [INFO][3221] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" iface="eth0" netns="/var/run/netns/cni-8209440a-5c1b-5d6a-548d-51dbe674fdbc" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.250 [INFO][3221] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.250 [INFO][3221] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.424 [INFO][3241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.424 [INFO][3241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.445 [INFO][3241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.459 [WARNING][3241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.459 [INFO][3241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.470 [INFO][3241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.485219 env[1147]: 2024-12-13 04:04:24.479 [INFO][3221] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:24.487066 env[1147]: time="2024-12-13T04:04:24.487022187Z" level=info msg="TearDown network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" successfully" Dec 13 04:04:24.487146 env[1147]: time="2024-12-13T04:04:24.487058895Z" level=info msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" returns successfully" Dec 13 04:04:24.488622 env[1147]: time="2024-12-13T04:04:24.487642848Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-lnkts,Uid:ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b,Namespace:calico-apiserver,Attempt:1,}" Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.741000 audit: BPF prog-id=139 op=LOAD Dec 13 04:04:24.741000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe168e1df0 a2=98 a3=3 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:24.741000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:24.741000 audit: BPF prog-id=139 op=UNLOAD Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit: BPF prog-id=140 op=LOAD Dec 13 04:04:24.752000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe168e1bd0 a2=74 a3=540051 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:24.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:24.752000 audit: BPF prog-id=140 op=UNLOAD Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:24.752000 audit: BPF prog-id=141 op=LOAD Dec 13 04:04:24.752000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe168e1c00 a2=94 a3=2 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:24.752000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:24.752000 audit: BPF prog-id=141 op=UNLOAD Dec 13 04:04:24.871722 systemd[1]: run-netns-cni\x2d6e6f173b\x2d93ff\x2d932c\x2d711d\x2d0cd2a66d1bce.mount: Deactivated successfully. Dec 13 04:04:24.871846 systemd[1]: run-netns-cni\x2d8209440a\x2d5c1b\x2d5d6a\x2d548d\x2d51dbe674fdbc.mount: Deactivated successfully. Dec 13 04:04:24.878000 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 04:04:24.878095 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calice51b79305d: link becomes ready Dec 13 04:04:24.887013 systemd-networkd[966]: calice51b79305d: Link UP Dec 13 04:04:24.887254 systemd-networkd[966]: calice51b79305d: Gained carrier Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.556 [INFO][3260] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.624 [INFO][3260] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0 calico-apiserver-76b85ff8db- calico-apiserver 4b52d933-866c-4c1d-b57c-83fb51ac132b 753 0 2024-12-13 04:03:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:76b85ff8db projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal calico-apiserver-76b85ff8db-kplzx eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calice51b79305d [] []}} ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.625 [INFO][3260] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.713 [INFO][3346] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" HandleID="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.751 [INFO][3346] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" HandleID="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000292b00), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"calico-apiserver-76b85ff8db-kplzx", "timestamp":"2024-12-13 04:04:24.713158477 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.751 [INFO][3346] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.751 [INFO][3346] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.751 [INFO][3346] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.756 [INFO][3346] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.784 [INFO][3346] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.793 [INFO][3346] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.796 [INFO][3346] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.798 [INFO][3346] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.798 [INFO][3346] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.800 [INFO][3346] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00 Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.808 [INFO][3346] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.827 [INFO][3346] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.65/26] block=192.168.27.64/26 handle="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.827 [INFO][3346] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.65/26] handle="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.827 [INFO][3346] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:24.927903 env[1147]: 2024-12-13 04:04:24.827 [INFO][3346] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.65/26] IPv6=[] ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" HandleID="k8s-pod-network.bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.831 [INFO][3260] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b52d933-866c-4c1d-b57c-83fb51ac132b", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"calico-apiserver-76b85ff8db-kplzx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calice51b79305d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.831 [INFO][3260] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.65/32] ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.831 [INFO][3260] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calice51b79305d ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.878 [INFO][3260] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.883 [INFO][3260] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b52d933-866c-4c1d-b57c-83fb51ac132b", ResourceVersion:"753", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00", Pod:"calico-apiserver-76b85ff8db-kplzx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calice51b79305d", MAC:"66:d8:bd:01:98:cc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:24.928834 env[1147]: 2024-12-13 04:04:24.924 [INFO][3260] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-kplzx" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:24.975869 systemd-networkd[966]: calie9bc7131211: Link UP Dec 13 04:04:24.978418 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9bc7131211: link becomes ready Dec 13 04:04:24.978671 systemd-networkd[966]: calie9bc7131211: Gained carrier Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.582 [INFO][3263] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.605 [INFO][3263] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0 coredns-6f6b679f8f- kube-system ec7d1cca-678c-407f-a5a9-b29e2444becf 751 0 2024-12-13 04:03:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal coredns-6f6b679f8f-r9gwq eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie9bc7131211 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.606 [INFO][3263] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.771 [INFO][3347] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" HandleID="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.794 [INFO][3347] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" HandleID="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332d90), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"coredns-6f6b679f8f-r9gwq", "timestamp":"2024-12-13 04:04:24.771217944 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.794 [INFO][3347] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.828 [INFO][3347] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.828 [INFO][3347] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.874 [INFO][3347] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.911 [INFO][3347] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.920 [INFO][3347] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.931 [INFO][3347] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.935 [INFO][3347] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.935 [INFO][3347] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.941 [INFO][3347] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621 Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.946 [INFO][3347] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.962 [INFO][3347] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.66/26] block=192.168.27.64/26 handle="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.962 [INFO][3347] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.66/26] handle="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.962 [INFO][3347] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:25.004920 env[1147]: 2024-12-13 04:04:24.962 [INFO][3347] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.66/26] IPv6=[] ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" HandleID="k8s-pod-network.4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:24.964 [INFO][3263] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec7d1cca-678c-407f-a5a9-b29e2444becf", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-r9gwq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9bc7131211", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:24.964 [INFO][3263] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.66/32] ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:24.964 [INFO][3263] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calie9bc7131211 ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:24.978 [INFO][3263] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:24.979 [INFO][3263] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec7d1cca-678c-407f-a5a9-b29e2444becf", ResourceVersion:"751", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621", Pod:"coredns-6f6b679f8f-r9gwq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9bc7131211", MAC:"76:87:71:09:5b:95", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.007218 env[1147]: 2024-12-13 04:04:25.003 [INFO][3263] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621" Namespace="kube-system" Pod="coredns-6f6b679f8f-r9gwq" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:25.018846 env[1147]: time="2024-12-13T04:04:25.012249374Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:25.018846 env[1147]: time="2024-12-13T04:04:25.012354521Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:25.018846 env[1147]: time="2024-12-13T04:04:25.012415425Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:25.018846 env[1147]: time="2024-12-13T04:04:25.012686322Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00 pid=3410 runtime=io.containerd.runc.v2 Dec 13 04:04:25.057372 systemd[1]: Started cri-containerd-bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00.scope. Dec 13 04:04:25.069518 env[1147]: time="2024-12-13T04:04:25.067581800Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:25.079158 systemd[1]: run-containerd-runc-k8s.io-bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00-runc.zUhxVn.mount: Deactivated successfully. Dec 13 04:04:25.085723 env[1147]: time="2024-12-13T04:04:25.084552181Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:25.085723 env[1147]: time="2024-12-13T04:04:25.084608426Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:25.085723 env[1147]: time="2024-12-13T04:04:25.084886407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621 pid=3444 runtime=io.containerd.runc.v2 Dec 13 04:04:25.094013 systemd-networkd[966]: cali6d9b825519f: Link UP Dec 13 04:04:25.101043 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6d9b825519f: link becomes ready Dec 13 04:04:25.100891 systemd-networkd[966]: cali6d9b825519f: Gained carrier Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.739 [INFO][3304] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0 csi-node-driver- calico-system 02dbc368-79f2-4a05-bc9e-bb995dd7d205 760 0 2024-12-13 04:03:52 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal csi-node-driver-c4vc5 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali6d9b825519f [] []}} ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.740 [INFO][3304] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.846 [INFO][3369] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" HandleID="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.909 [INFO][3369] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" HandleID="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000332c80), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"csi-node-driver-c4vc5", "timestamp":"2024-12-13 04:04:24.846374038 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.909 [INFO][3369] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.962 [INFO][3369] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.962 [INFO][3369] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.967 [INFO][3369] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:24.989 [INFO][3369] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.028 [INFO][3369] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.031 [INFO][3369] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.037 [INFO][3369] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.037 [INFO][3369] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.039 [INFO][3369] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.045 [INFO][3369] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.072 [INFO][3369] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.67/26] block=192.168.27.64/26 handle="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.072 [INFO][3369] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.67/26] handle="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.072 [INFO][3369] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:25.123827 env[1147]: 2024-12-13 04:04:25.072 [INFO][3369] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.67/26] IPv6=[] ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" HandleID="k8s-pod-network.a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.084 [INFO][3304] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02dbc368-79f2-4a05-bc9e-bb995dd7d205", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"csi-node-driver-c4vc5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d9b825519f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.084 [INFO][3304] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.67/32] ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.084 [INFO][3304] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6d9b825519f ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.097 [INFO][3304] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.098 [INFO][3304] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02dbc368-79f2-4a05-bc9e-bb995dd7d205", ResourceVersion:"760", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d", Pod:"csi-node-driver-c4vc5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d9b825519f", MAC:"76:2b:37:2b:5f:1b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.124553 env[1147]: 2024-12-13 04:04:25.118 [INFO][3304] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d" Namespace="calico-system" Pod="csi-node-driver-c4vc5" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:25.159260 systemd[1]: Started cri-containerd-4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621.scope. Dec 13 04:04:25.190683 systemd-networkd[966]: calia336f972ef5: Link UP Dec 13 04:04:25.197006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia336f972ef5: link becomes ready Dec 13 04:04:25.196872 systemd-networkd[966]: calia336f972ef5: Gained carrier Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.198000 audit: BPF prog-id=142 op=LOAD Dec 13 04:04:25.200000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.200000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3410 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333638643632333135653639313435393632303938303137316130 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3410 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333638643632333135653639313435393632303938303137316130 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit: BPF prog-id=143 op=LOAD Dec 13 04:04:25.201000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001cb7b0 items=0 ppid=3410 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333638643632333135653639313435393632303938303137316130 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.201000 audit: BPF prog-id=144 op=LOAD Dec 13 04:04:25.201000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001cb7f8 items=0 ppid=3410 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333638643632333135653639313435393632303938303137316130 Dec 13 04:04:25.201000 audit: BPF prog-id=144 op=UNLOAD Dec 13 04:04:25.201000 audit: BPF prog-id=143 op=UNLOAD Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { perfmon } for pid=3429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit[3429]: AVC avc: denied { bpf } for pid=3429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.202000 audit: BPF prog-id=145 op=LOAD Dec 13 04:04:25.202000 audit[3429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cbc08 items=0 ppid=3410 pid=3429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262333638643632333135653639313435393632303938303137316130 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.207000 audit: BPF prog-id=146 op=LOAD Dec 13 04:04:25.206000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.206000 audit: BPF prog-id=147 op=LOAD Dec 13 04:04:25.206000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe168e1ac0 a2=40 a3=1 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.206000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.209000 audit: BPF prog-id=147 op=UNLOAD Dec 13 04:04:25.209000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.209000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe168e1b90 a2=50 a3=7ffe168e1c70 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.209000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.212000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.212000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3444 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393035353137313737353633336138613731333333336437643735 Dec 13 04:04:25.212000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.212000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3444 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393035353137313737353633336138613731333333336437643735 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.214000 audit: BPF prog-id=148 op=LOAD Dec 13 04:04:25.214000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003820e0 items=0 ppid=3444 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393035353137313737353633336138613731333333336437643735 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.216000 audit: BPF prog-id=149 op=LOAD Dec 13 04:04:25.216000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000382128 items=0 ppid=3444 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393035353137313737353633336138613731333333336437643735 Dec 13 04:04:25.221000 audit: BPF prog-id=149 op=UNLOAD Dec 13 04:04:25.221000 audit: BPF prog-id=148 op=UNLOAD Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { perfmon } for pid=3455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit[3455]: AVC avc: denied { bpf } for pid=3455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.222000 audit: BPF prog-id=150 op=LOAD Dec 13 04:04:25.222000 audit[3455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000382538 items=0 ppid=3444 pid=3455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464393035353137313737353633336138613731333333336437643735 Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:24.740 [INFO][3314] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0 calico-apiserver-76b85ff8db- calico-apiserver ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b 759 0 2024-12-13 04:03:52 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:76b85ff8db projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal calico-apiserver-76b85ff8db-lnkts eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia336f972ef5 [] []}} ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:24.741 [INFO][3314] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:24.893 [INFO][3370] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" HandleID="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:24.914 [INFO][3370] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" HandleID="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003c4680), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"calico-apiserver-76b85ff8db-lnkts", "timestamp":"2024-12-13 04:04:24.893108605 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:24.914 [INFO][3370] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.073 [INFO][3370] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.073 [INFO][3370] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.083 [INFO][3370] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.123 [INFO][3370] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.138 [INFO][3370] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.143 [INFO][3370] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.147 [INFO][3370] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.147 [INFO][3370] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.150 [INFO][3370] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521 Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.172 [INFO][3370] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.182 [INFO][3370] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.68/26] block=192.168.27.64/26 handle="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.182 [INFO][3370] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.68/26] handle="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.182 [INFO][3370] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:25.248951 env[1147]: 2024-12-13 04:04:25.182 [INFO][3370] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.68/26] IPv6=[] ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" HandleID="k8s-pod-network.1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.184 [INFO][3314] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"calico-apiserver-76b85ff8db-lnkts", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia336f972ef5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.184 [INFO][3314] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.68/32] ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.184 [INFO][3314] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia336f972ef5 ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.197 [INFO][3314] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.208 [INFO][3314] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521", Pod:"calico-apiserver-76b85ff8db-lnkts", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia336f972ef5", MAC:"86:5f:ba:86:7f:68", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:25.249674 env[1147]: 2024-12-13 04:04:25.245 [INFO][3314] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521" Namespace="calico-apiserver" Pod="calico-apiserver-76b85ff8db-lnkts" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:25.258915 env[1147]: time="2024-12-13T04:04:25.258203633Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:25.258915 env[1147]: time="2024-12-13T04:04:25.258288241Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:25.258915 env[1147]: time="2024-12-13T04:04:25.258336701Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:25.258915 env[1147]: time="2024-12-13T04:04:25.258501721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d pid=3509 runtime=io.containerd.runc.v2 Dec 13 04:04:25.302000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.307323 systemd[1]: Started cri-containerd-a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d.scope. Dec 13 04:04:25.302000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1ad0 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.302000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe168e1b00 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe168e1a10 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1b20 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1b00 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1af0 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1b20 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe168e1b00 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe168e1b20 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe168e1af0 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.312000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.312000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe168e1b60 a2=28 a3=0 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.312000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe168e1910 a2=50 a3=1 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.313000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.313000 audit: BPF prog-id=151 op=LOAD Dec 13 04:04:25.313000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe168e1910 a2=94 a3=5 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.313000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.315000 audit: BPF prog-id=151 op=UNLOAD Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe168e19c0 a2=50 a3=1 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe168e1ae0 a2=4 a3=38 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.315000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe168e1b30 a2=94 a3=6 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.315000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe168e12e0 a2=94 a3=83 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.315000 audit[3367]: AVC avc: denied { confidentiality } for pid=3367 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.315000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe168e12e0 a2=94 a3=83 items=0 ppid=3126 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.315000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.360000 audit: BPF prog-id=152 op=LOAD Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3509 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353832386262613330353663373832656535383936393532333161 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3509 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353832386262613330353663373832656535383936393532333161 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit: BPF prog-id=153 op=LOAD Dec 13 04:04:25.361000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000185f10 items=0 ppid=3509 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353832386262613330353663373832656535383936393532333161 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit: BPF prog-id=154 op=LOAD Dec 13 04:04:25.361000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185f58 items=0 ppid=3509 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353832386262613330353663373832656535383936393532333161 Dec 13 04:04:25.361000 audit: BPF prog-id=154 op=UNLOAD Dec 13 04:04:25.361000 audit: BPF prog-id=153 op=UNLOAD Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { perfmon } for pid=3529 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit[3529]: AVC avc: denied { bpf } for pid=3529 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.361000 audit: BPF prog-id=155 op=LOAD Dec 13 04:04:25.361000 audit[3529]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c0368 items=0 ppid=3509 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137353832386262613330353663373832656535383936393532333161 Dec 13 04:04:25.358352 systemd[1]: Started cri-containerd-1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521.scope. Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.326889675Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.326937173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.326950708Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.328268063Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521 pid=3550 runtime=io.containerd.runc.v2 Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.344131795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-r9gwq,Uid:ec7d1cca-678c-407f-a5a9-b29e2444becf,Namespace:kube-system,Attempt:1,} returns sandbox id \"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621\"" Dec 13 04:04:25.387409 env[1147]: time="2024-12-13T04:04:25.378448761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-kplzx,Uid:4b52d933-866c-4c1d-b57c-83fb51ac132b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00\"" Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.395230 env[1147]: time="2024-12-13T04:04:25.395185677Z" level=info msg="CreateContainer within sandbox \"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 04:04:25.389000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.389000 audit: BPF prog-id=156 op=LOAD Dec 13 04:04:25.389000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5dde9f10 a2=98 a3=1999999999999999 items=0 ppid=3126 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.389000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 04:04:25.398000 audit: BPF prog-id=156 op=UNLOAD Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit: BPF prog-id=157 op=LOAD Dec 13 04:04:25.398000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5dde9df0 a2=74 a3=ffff items=0 ppid=3126 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.398000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 04:04:25.398000 audit: BPF prog-id=157 op=UNLOAD Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.398000 audit: BPF prog-id=158 op=LOAD Dec 13 04:04:25.398000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5dde9e30 a2=40 a3=7fff5ddea010 items=0 ppid=3126 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.398000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 04:04:25.398000 audit: BPF prog-id=158 op=UNLOAD Dec 13 04:04:25.418264 env[1147]: time="2024-12-13T04:04:25.417684630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.438000 audit: BPF prog-id=159 op=LOAD Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3550 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383738393832373734353963646532383661326138356338656361 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3550 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383738393832373734353963646532383661326138356338656361 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.441000 audit: BPF prog-id=160 op=LOAD Dec 13 04:04:25.441000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b6880 items=0 ppid=3550 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.441000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383738393832373734353963646532383661326138356338656361 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.442000 audit: BPF prog-id=161 op=LOAD Dec 13 04:04:25.442000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b68c8 items=0 ppid=3550 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383738393832373734353963646532383661326138356338656361 Dec 13 04:04:25.446000 audit: BPF prog-id=161 op=UNLOAD Dec 13 04:04:25.446000 audit: BPF prog-id=160 op=UNLOAD Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.446000 audit: BPF prog-id=162 op=LOAD Dec 13 04:04:25.446000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6cd8 items=0 ppid=3550 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139383738393832373734353963646532383661326138356338656361 Dec 13 04:04:25.457222 env[1147]: time="2024-12-13T04:04:25.457154174Z" level=info msg="CreateContainer within sandbox \"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"87dc2a341380054fa6cf56d3aaf7f67d0d729fb305e37f77192291bf8f9e9940\"" Dec 13 04:04:25.459077 env[1147]: time="2024-12-13T04:04:25.459035544Z" level=info msg="StartContainer for \"87dc2a341380054fa6cf56d3aaf7f67d0d729fb305e37f77192291bf8f9e9940\"" Dec 13 04:04:25.491753 env[1147]: time="2024-12-13T04:04:25.491699098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-c4vc5,Uid:02dbc368-79f2-4a05-bc9e-bb995dd7d205,Namespace:calico-system,Attempt:1,} returns sandbox id \"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d\"" Dec 13 04:04:25.523862 env[1147]: time="2024-12-13T04:04:25.523673073Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76b85ff8db-lnkts,Uid:ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521\"" Dec 13 04:04:25.544017 systemd[1]: Started cri-containerd-87dc2a341380054fa6cf56d3aaf7f67d0d729fb305e37f77192291bf8f9e9940.scope. Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.390 [INFO][3515] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.390 [INFO][3515] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" iface="eth0" netns="/var/run/netns/cni-f878758f-3d5e-88e2-8515-cda4e5d392ba" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.390 [INFO][3515] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" iface="eth0" netns="/var/run/netns/cni-f878758f-3d5e-88e2-8515-cda4e5d392ba" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.391 [INFO][3515] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" iface="eth0" netns="/var/run/netns/cni-f878758f-3d5e-88e2-8515-cda4e5d392ba" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.391 [INFO][3515] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.391 [INFO][3515] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.516 [INFO][3602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" HandleID="k8s-pod-network.ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.517 [INFO][3602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.517 [INFO][3602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.530 [WARNING][3602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" HandleID="k8s-pod-network.ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.530 [INFO][3602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" HandleID="k8s-pod-network.ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.532 [INFO][3602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:25.545728 env[1147]: 2024-12-13 04:04:25.536 [INFO][3515] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79" Dec 13 04:04:25.560509 env[1147]: time="2024-12-13T04:04:25.560438991Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:1,} failed, error" error="failed to setup network for sandbox \"ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79\": plugin type=\"calico\" failed (add): Get \"https://10.96.0.1:443/api/v1/namespaces/calico-system\": tls: failed to verify certificate: x509: certificate signed by unknown authority" Dec 13 04:04:25.561164 kubelet[1926]: E1213 04:04:25.560981 1926 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79\": plugin type=\"calico\" failed (add): Get \"https://10.96.0.1:443/api/v1/namespaces/calico-system\": tls: failed to verify certificate: x509: certificate signed by unknown authority" Dec 13 04:04:25.564203 kubelet[1926]: E1213 04:04:25.563814 1926 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79\": plugin type=\"calico\" failed (add): Get \"https://10.96.0.1:443/api/v1/namespaces/calico-system\": tls: failed to verify certificate: x509: certificate signed by unknown authority" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:25.564203 kubelet[1926]: E1213 04:04:25.563872 1926 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79\": plugin type=\"calico\" failed (add): Get \"https://10.96.0.1:443/api/v1/namespaces/calico-system\": tls: failed to verify certificate: x509: certificate signed by unknown authority" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" Dec 13 04:04:25.564203 kubelet[1926]: E1213 04:04:25.563946 1926 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79d4cbddb8-5gn6s_calico-system(4408bdef-bdcb-4b03-a17f-062e757020c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79d4cbddb8-5gn6s_calico-system(4408bdef-bdcb-4b03-a17f-062e757020c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79\\\": plugin type=\\\"calico\\\" failed (add): Get \\\"https://10.96.0.1:443/api/v1/namespaces/calico-system\\\": tls: failed to verify certificate: x509: certificate signed by unknown authority\"" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" podUID="4408bdef-bdcb-4b03-a17f-062e757020c1" Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.572000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.572000 audit: BPF prog-id=163 op=LOAD Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=3444 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837646332613334313338303035346661366366353664336161663766 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=8 items=0 ppid=3444 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837646332613334313338303035346661366366353664336161663766 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit: BPF prog-id=164 op=LOAD Dec 13 04:04:25.574000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c00015fe30 items=0 ppid=3444 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837646332613334313338303035346661366366353664336161663766 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.574000 audit: BPF prog-id=165 op=LOAD Dec 13 04:04:25.574000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c00015fe78 items=0 ppid=3444 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837646332613334313338303035346661366366353664336161663766 Dec 13 04:04:25.575000 audit: BPF prog-id=165 op=UNLOAD Dec 13 04:04:25.575000 audit: BPF prog-id=164 op=UNLOAD Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.575000 audit: BPF prog-id=166 op=LOAD Dec 13 04:04:25.575000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000398288 items=0 ppid=3444 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837646332613334313338303035346661366366353664336161663766 Dec 13 04:04:25.621309 env[1147]: time="2024-12-13T04:04:25.621236046Z" level=info msg="StartContainer for \"87dc2a341380054fa6cf56d3aaf7f67d0d729fb305e37f77192291bf8f9e9940\" returns successfully" Dec 13 04:04:25.652647 systemd-networkd[966]: vxlan.calico: Link UP Dec 13 04:04:25.652664 systemd-networkd[966]: vxlan.calico: Gained carrier Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.675000 audit: BPF prog-id=167 op=LOAD Dec 13 04:04:25.675000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee97c8ec0 a2=98 a3=100 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.675000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.681000 audit: BPF prog-id=167 op=UNLOAD Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit: BPF prog-id=168 op=LOAD Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee97c8cd0 a2=74 a3=540051 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit: BPF prog-id=168 op=UNLOAD Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit: BPF prog-id=169 op=LOAD Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffee97c8d00 a2=94 a3=2 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit: BPF prog-id=169 op=UNLOAD Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8bd0 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee97c8c00 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee97c8b10 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8c20 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8c00 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8bf0 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8c20 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee97c8c00 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee97c8c20 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffee97c8bf0 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.682000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.682000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffee97c8c60 a2=28 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.682000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.683000 audit: BPF prog-id=170 op=LOAD Dec 13 04:04:25.683000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee97c8ad0 a2=40 a3=0 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.683000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.683000 audit: BPF prog-id=170 op=UNLOAD Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffee97c8ac0 a2=50 a3=2800 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffee97c8ac0 a2=50 a3=2800 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.684000 audit: BPF prog-id=171 op=LOAD Dec 13 04:04:25.684000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee97c82e0 a2=94 a3=2 items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.684000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.685000 audit: BPF prog-id=171 op=UNLOAD Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { perfmon } for pid=3676 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit[3676]: AVC avc: denied { bpf } for pid=3676 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.685000 audit: BPF prog-id=172 op=LOAD Dec 13 04:04:25.685000 audit[3676]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffee97c83e0 a2=94 a3=2d items=0 ppid=3126 pid=3676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.685000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.688000 audit: BPF prog-id=173 op=LOAD Dec 13 04:04:25.688000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc075e27a0 a2=98 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.688000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.689000 audit: BPF prog-id=173 op=UNLOAD Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit: BPF prog-id=174 op=LOAD Dec 13 04:04:25.690000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc075e2580 a2=74 a3=540051 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.690000 audit: BPF prog-id=174 op=UNLOAD Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.690000 audit: BPF prog-id=175 op=LOAD Dec 13 04:04:25.690000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc075e25b0 a2=94 a3=2 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.691000 audit: BPF prog-id=175 op=UNLOAD Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.841000 audit: BPF prog-id=176 op=LOAD Dec 13 04:04:25.841000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc075e2470 a2=40 a3=1 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.841000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.848000 audit: BPF prog-id=176 op=UNLOAD Dec 13 04:04:25.848000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.848000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc075e2540 a2=50 a3=7ffc075e2620 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.848000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.873734 systemd[1]: run-netns-cni\x2df878758f\x2d3d5e\x2d88e2\x2d8515\x2dcda4e5d392ba.mount: Deactivated successfully. Dec 13 04:04:25.874017 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ccdf5ab0b82350180f3be7c26b423640178c9f9aa8a581da9c09a44831188a79-shm.mount: Deactivated successfully. Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e2480 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc075e24b0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc075e23c0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e24d0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e24b0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.885000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.885000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e24a0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.885000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888169 env[1147]: time="2024-12-13T04:04:25.888121596Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:25.887000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.887000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e24d0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.887000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.887000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.887000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc075e24b0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.887000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.887000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.887000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc075e24d0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.887000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.887000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.887000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc075e24a0 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.887000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc075e2510 a2=28 a3=0 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc075e22c0 a2=50 a3=1 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit: BPF prog-id=177 op=LOAD Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc075e22c0 a2=94 a3=5 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit: BPF prog-id=177 op=UNLOAD Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc075e2370 a2=50 a3=1 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc075e2490 a2=4 a3=38 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.888000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.888000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc075e24e0 a2=94 a3=6 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.888000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.889000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc075e1c90 a2=94 a3=83 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { perfmon } for pid=3681 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { confidentiality } for pid=3681 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 04:04:25.889000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc075e1c90 a2=94 a3=83 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.889000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.889000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc075e36d0 a2=10 a3=f0f1 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.889000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.890000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.890000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc075e3570 a2=10 a3=3 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.890000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.890000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc075e3510 a2=10 a3=3 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.890000 audit[3681]: AVC avc: denied { bpf } for pid=3681 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:25.890000 audit[3681]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc075e3510 a2=10 a3=7 items=0 ppid=3126 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.890000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 04:04:25.899000 audit: BPF prog-id=172 op=UNLOAD Dec 13 04:04:25.936000 audit[3710]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:25.936000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcb4dd10a0 a2=0 a3=7ffcb4dd108c items=0 ppid=2020 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.936000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:25.943000 audit[3710]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=3710 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:25.943000 audit[3710]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffcb4dd10a0 a2=0 a3=0 items=0 ppid=2020 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:25.943000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:26.056000 audit[3743]: NETFILTER_CFG table=mangle:99 family=2 entries=16 op=nft_register_chain pid=3743 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:26.056000 audit[3743]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd828a2350 a2=0 a3=7ffd828a233c items=0 ppid=3126 pid=3743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.056000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:26.069000 audit[3740]: NETFILTER_CFG table=nat:100 family=2 entries=15 op=nft_register_chain pid=3740 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:26.069000 audit[3740]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffe47e23f70 a2=0 a3=7ffe47e23f5c items=0 ppid=3126 pid=3740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.069000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:26.078000 audit[3745]: NETFILTER_CFG table=filter:101 family=2 entries=161 op=nft_register_chain pid=3745 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:26.078000 audit[3745]: SYSCALL arch=c000003e syscall=46 success=yes exit=93048 a0=3 a1=7ffe394ae6f0 a2=0 a3=7ffe394ae6dc items=0 ppid=3126 pid=3745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:26.102000 audit[3741]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=3741 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:26.102000 audit[3741]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffda0330ce0 a2=0 a3=7ffda0330ccc items=0 ppid=3126 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.102000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:25.999 [INFO][3701] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:25.999 [INFO][3701] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:25.999 [INFO][3701] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:25.999 [INFO][3701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.032 [INFO][3724] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.032 [INFO][3724] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.032 [INFO][3724] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.110 [WARNING][3724] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.111 [INFO][3724] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.112 [INFO][3724] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:26.116627 env[1147]: 2024-12-13 04:04:26.114 [INFO][3701] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:26.117170 env[1147]: time="2024-12-13T04:04:26.117125665Z" level=info msg="TearDown network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" successfully" Dec 13 04:04:26.117254 env[1147]: time="2024-12-13T04:04:26.117236852Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" returns successfully" Dec 13 04:04:26.118130 env[1147]: time="2024-12-13T04:04:26.118105267Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:1,}" Dec 13 04:04:26.329804 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7362fe6b186: link becomes ready Dec 13 04:04:26.330252 systemd-networkd[966]: cali7362fe6b186: Link UP Dec 13 04:04:26.330419 systemd-networkd[966]: cali7362fe6b186: Gained carrier Dec 13 04:04:26.346137 kubelet[1926]: I1213 04:04:26.346061 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-r9gwq" podStartSLOduration=46.346042425 podStartE2EDuration="46.346042425s" podCreationTimestamp="2024-12-13 04:03:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:04:25.90950441 +0000 UTC m=+47.052478700" watchObservedRunningTime="2024-12-13 04:04:26.346042425 +0000 UTC m=+47.489016695" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.240 [INFO][3752] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0 calico-kube-controllers-79d4cbddb8- calico-system 4408bdef-bdcb-4b03-a17f-062e757020c1 752 0 2024-12-13 04:03:53 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79d4cbddb8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal calico-kube-controllers-79d4cbddb8-5gn6s eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali7362fe6b186 [] []}} ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.240 [INFO][3752] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.275 [INFO][3764] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" HandleID="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.285 [INFO][3764] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" HandleID="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00030fb50), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"calico-kube-controllers-79d4cbddb8-5gn6s", "timestamp":"2024-12-13 04:04:26.275742226 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.286 [INFO][3764] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.286 [INFO][3764] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.286 [INFO][3764] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.288 [INFO][3764] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.292 [INFO][3764] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.298 [INFO][3764] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.300 [INFO][3764] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.303 [INFO][3764] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.303 [INFO][3764] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.305 [INFO][3764] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.313 [INFO][3764] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.324 [INFO][3764] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.69/26] block=192.168.27.64/26 handle="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.324 [INFO][3764] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.69/26] handle="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.324 [INFO][3764] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:26.349112 env[1147]: 2024-12-13 04:04:26.324 [INFO][3764] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.69/26] IPv6=[] ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" HandleID="k8s-pod-network.de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.326 [INFO][3752] cni-plugin/k8s.go 386: Populated endpoint ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0", GenerateName:"calico-kube-controllers-79d4cbddb8-", Namespace:"calico-system", SelfLink:"", UID:"4408bdef-bdcb-4b03-a17f-062e757020c1", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79d4cbddb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"calico-kube-controllers-79d4cbddb8-5gn6s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7362fe6b186", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.326 [INFO][3752] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.69/32] ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.326 [INFO][3752] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7362fe6b186 ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.329 [INFO][3752] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.330 [INFO][3752] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0", GenerateName:"calico-kube-controllers-79d4cbddb8-", Namespace:"calico-system", SelfLink:"", UID:"4408bdef-bdcb-4b03-a17f-062e757020c1", ResourceVersion:"752", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79d4cbddb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec", Pod:"calico-kube-controllers-79d4cbddb8-5gn6s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7362fe6b186", MAC:"4a:55:bc:c7:1d:72", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:26.349802 env[1147]: 2024-12-13 04:04:26.346 [INFO][3752] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec" Namespace="calico-system" Pod="calico-kube-controllers-79d4cbddb8-5gn6s" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:26.370000 audit[3784]: NETFILTER_CFG table=filter:103 family=2 entries=46 op=nft_register_chain pid=3784 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:26.370000 audit[3784]: SYSCALL arch=c000003e syscall=46 success=yes exit=22204 a0=3 a1=7ffd6567b0f0 a2=0 a3=7ffd6567b0dc items=0 ppid=3126 pid=3784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.370000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:26.379302 env[1147]: time="2024-12-13T04:04:26.379224244Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:26.379414 env[1147]: time="2024-12-13T04:04:26.379273827Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:26.379414 env[1147]: time="2024-12-13T04:04:26.379314572Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:26.379509 env[1147]: time="2024-12-13T04:04:26.379487977Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec pid=3791 runtime=io.containerd.runc.v2 Dec 13 04:04:26.402482 systemd[1]: run-containerd-runc-k8s.io-de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec-runc.nx9OIC.mount: Deactivated successfully. Dec 13 04:04:26.412075 systemd[1]: Started cri-containerd-de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec.scope. Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.428000 audit: BPF prog-id=178 op=LOAD Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3791 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465363131333833666539346638326130343133616366393339646537 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3791 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465363131333833666539346638326130343133616366393339646537 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit: BPF prog-id=179 op=LOAD Dec 13 04:04:26.429000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000025710 items=0 ppid=3791 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465363131333833666539346638326130343133616366393339646537 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit: BPF prog-id=180 op=LOAD Dec 13 04:04:26.429000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000025758 items=0 ppid=3791 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465363131333833666539346638326130343133616366393339646537 Dec 13 04:04:26.429000 audit: BPF prog-id=180 op=UNLOAD Dec 13 04:04:26.429000 audit: BPF prog-id=179 op=UNLOAD Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { perfmon } for pid=3799 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit[3799]: AVC avc: denied { bpf } for pid=3799 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:26.429000 audit: BPF prog-id=181 op=LOAD Dec 13 04:04:26.429000 audit[3799]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025b68 items=0 ppid=3791 pid=3799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:26.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465363131333833666539346638326130343133616366393339646537 Dec 13 04:04:26.492548 env[1147]: time="2024-12-13T04:04:26.492495163Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79d4cbddb8-5gn6s,Uid:4408bdef-bdcb-4b03-a17f-062e757020c1,Namespace:calico-system,Attempt:1,} returns sandbox id \"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec\"" Dec 13 04:04:26.651419 systemd-networkd[966]: cali6d9b825519f: Gained IPv6LL Dec 13 04:04:26.651747 systemd-networkd[966]: calia336f972ef5: Gained IPv6LL Dec 13 04:04:26.843049 systemd-networkd[966]: calice51b79305d: Gained IPv6LL Dec 13 04:04:26.971070 systemd-networkd[966]: calie9bc7131211: Gained IPv6LL Dec 13 04:04:27.012000 audit[3826]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.017559 kernel: kauditd_printk_skb: 905 callbacks suppressed Dec 13 04:04:27.017872 kernel: audit: type=1325 audit(1734062667.012:1239): table=filter:104 family=2 entries=13 op=nft_register_rule pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.017964 kernel: audit: type=1300 audit(1734062667.012:1239): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc373d8610 a2=0 a3=7ffc373d85fc items=0 ppid=2020 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.012000 audit[3826]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc373d8610 a2=0 a3=7ffc373d85fc items=0 ppid=2020 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.012000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:27.025813 kernel: audit: type=1327 audit(1734062667.012:1239): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:27.028000 audit[3826]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.028000 audit[3826]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc373d8610 a2=0 a3=7ffc373d85fc items=0 ppid=2020 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.037849 kernel: audit: type=1325 audit(1734062667.028:1240): table=nat:105 family=2 entries=35 op=nft_register_chain pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.037993 kernel: audit: type=1300 audit(1734062667.028:1240): arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc373d8610 a2=0 a3=7ffc373d85fc items=0 ppid=2020 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.028000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:27.041187 kernel: audit: type=1327 audit(1734062667.028:1240): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:27.087438 env[1147]: time="2024-12-13T04:04:27.087046072Z" level=info msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" Dec 13 04:04:27.099515 systemd-networkd[966]: vxlan.calico: Gained IPv6LL Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.225 [INFO][3844] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.225 [INFO][3844] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" iface="eth0" netns="/var/run/netns/cni-475b3948-aecc-6749-5099-0f091e0ee370" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.226 [INFO][3844] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" iface="eth0" netns="/var/run/netns/cni-475b3948-aecc-6749-5099-0f091e0ee370" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.226 [INFO][3844] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" iface="eth0" netns="/var/run/netns/cni-475b3948-aecc-6749-5099-0f091e0ee370" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.226 [INFO][3844] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.226 [INFO][3844] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.260 [INFO][3850] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.260 [INFO][3850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.260 [INFO][3850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.268 [WARNING][3850] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.268 [INFO][3850] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.270 [INFO][3850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:27.274411 env[1147]: 2024-12-13 04:04:27.272 [INFO][3844] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:27.277709 systemd[1]: run-netns-cni\x2d475b3948\x2daecc\x2d6749\x2d5099\x2d0f091e0ee370.mount: Deactivated successfully. Dec 13 04:04:27.279446 env[1147]: time="2024-12-13T04:04:27.279413069Z" level=info msg="TearDown network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" successfully" Dec 13 04:04:27.279531 env[1147]: time="2024-12-13T04:04:27.279512775Z" level=info msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" returns successfully" Dec 13 04:04:27.280352 env[1147]: time="2024-12-13T04:04:27.280326327Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4htdt,Uid:05f405fc-50fb-4f02-9ce2-d06cefea988c,Namespace:kube-system,Attempt:1,}" Dec 13 04:04:27.499063 systemd-networkd[966]: cali4c392e0cbd4: Link UP Dec 13 04:04:27.502189 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 04:04:27.502623 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali4c392e0cbd4: link becomes ready Dec 13 04:04:27.502485 systemd-networkd[966]: cali4c392e0cbd4: Gained carrier Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.386 [INFO][3861] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0 coredns-6f6b679f8f- kube-system 05f405fc-50fb-4f02-9ce2-d06cefea988c 802 0 2024-12-13 04:03:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-b-9ccf4f3b90.novalocal coredns-6f6b679f8f-4htdt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali4c392e0cbd4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.386 [INFO][3861] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.427 [INFO][3868] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" HandleID="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.444 [INFO][3868] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" HandleID="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000309170), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-b-9ccf4f3b90.novalocal", "pod":"coredns-6f6b679f8f-4htdt", "timestamp":"2024-12-13 04:04:27.427681391 +0000 UTC"}, Hostname:"ci-3510-3-6-b-9ccf4f3b90.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.444 [INFO][3868] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.444 [INFO][3868] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.444 [INFO][3868] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-b-9ccf4f3b90.novalocal' Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.447 [INFO][3868] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.453 [INFO][3868] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.462 [INFO][3868] ipam/ipam.go 489: Trying affinity for 192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.465 [INFO][3868] ipam/ipam.go 155: Attempting to load block cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.469 [INFO][3868] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.27.64/26 host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.469 [INFO][3868] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.27.64/26 handle="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.471 [INFO][3868] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.478 [INFO][3868] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.27.64/26 handle="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.492 [INFO][3868] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.27.70/26] block=192.168.27.64/26 handle="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.492 [INFO][3868] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.27.70/26] handle="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" host="ci-3510-3-6-b-9ccf4f3b90.novalocal" Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.492 [INFO][3868] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:27.530706 env[1147]: 2024-12-13 04:04:27.492 [INFO][3868] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.27.70/26] IPv6=[] ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" HandleID="k8s-pod-network.68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.494 [INFO][3861] cni-plugin/k8s.go 386: Populated endpoint ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05f405fc-50fb-4f02-9ce2-d06cefea988c", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"", Pod:"coredns-6f6b679f8f-4htdt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4c392e0cbd4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.494 [INFO][3861] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.27.70/32] ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.494 [INFO][3861] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali4c392e0cbd4 ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.503 [INFO][3861] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.503 [INFO][3861] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05f405fc-50fb-4f02-9ce2-d06cefea988c", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b", Pod:"coredns-6f6b679f8f-4htdt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4c392e0cbd4", MAC:"72:91:2b:d7:2e:d0", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:27.532846 env[1147]: 2024-12-13 04:04:27.526 [INFO][3861] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b" Namespace="kube-system" Pod="coredns-6f6b679f8f-4htdt" WorkloadEndpoint="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:27.570000 audit[3886]: NETFILTER_CFG table=filter:106 family=2 entries=46 op=nft_register_chain pid=3886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:27.574845 kernel: audit: type=1325 audit(1734062667.570:1241): table=filter:106 family=2 entries=46 op=nft_register_chain pid=3886 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 04:04:27.570000 audit[3886]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7fffe3f5eb70 a2=0 a3=7fffe3f5eb5c items=0 ppid=3126 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.570000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:27.585539 kernel: audit: type=1300 audit(1734062667.570:1241): arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7fffe3f5eb70 a2=0 a3=7fffe3f5eb5c items=0 ppid=3126 pid=3886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.585630 kernel: audit: type=1327 audit(1734062667.570:1241): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 04:04:27.589898 env[1147]: time="2024-12-13T04:04:27.586019461Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 04:04:27.589898 env[1147]: time="2024-12-13T04:04:27.586067390Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 04:04:27.589898 env[1147]: time="2024-12-13T04:04:27.586082158Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 04:04:27.589898 env[1147]: time="2024-12-13T04:04:27.586256995Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b pid=3894 runtime=io.containerd.runc.v2 Dec 13 04:04:27.621358 systemd[1]: Started cri-containerd-68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b.scope. Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.644000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.648000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.648000 audit: BPF prog-id=182 op=LOAD Dec 13 04:04:27.649929 kernel: audit: type=1400 audit(1734062667.644:1242): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643134343234363135373332363335373336396362356236623133 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643134343234363135373332363335373336396362356236623133 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.649000 audit: BPF prog-id=183 op=LOAD Dec 13 04:04:27.649000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00037a900 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.649000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643134343234363135373332363335373336396362356236623133 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit: BPF prog-id=184 op=LOAD Dec 13 04:04:27.651000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00037a948 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643134343234363135373332363335373336396362356236623133 Dec 13 04:04:27.651000 audit: BPF prog-id=184 op=UNLOAD Dec 13 04:04:27.651000 audit: BPF prog-id=183 op=UNLOAD Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.651000 audit: BPF prog-id=185 op=LOAD Dec 13 04:04:27.651000 audit[3904]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00037ad58 items=0 ppid=3894 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638643134343234363135373332363335373336396362356236623133 Dec 13 04:04:27.694321 env[1147]: time="2024-12-13T04:04:27.694267528Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-4htdt,Uid:05f405fc-50fb-4f02-9ce2-d06cefea988c,Namespace:kube-system,Attempt:1,} returns sandbox id \"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b\"" Dec 13 04:04:27.697594 env[1147]: time="2024-12-13T04:04:27.697419495Z" level=info msg="CreateContainer within sandbox \"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 04:04:27.739724 env[1147]: time="2024-12-13T04:04:27.739672376Z" level=info msg="CreateContainer within sandbox \"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a7798b9eb4197dfefa7e79537ca44ec8f9fda4454b6d0bf3aec2097dab8baea3\"" Dec 13 04:04:27.742112 systemd-networkd[966]: cali7362fe6b186: Gained IPv6LL Dec 13 04:04:27.745691 env[1147]: time="2024-12-13T04:04:27.745605185Z" level=info msg="StartContainer for \"a7798b9eb4197dfefa7e79537ca44ec8f9fda4454b6d0bf3aec2097dab8baea3\"" Dec 13 04:04:27.764883 systemd[1]: Started cri-containerd-a7798b9eb4197dfefa7e79537ca44ec8f9fda4454b6d0bf3aec2097dab8baea3.scope. Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.788000 audit: BPF prog-id=186 op=LOAD Dec 13 04:04:27.794000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.794000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3894 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373938623965623431393764666566613765373935333763613434 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3894 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373938623965623431393764666566613765373935333763613434 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.795000 audit: BPF prog-id=187 op=LOAD Dec 13 04:04:27.795000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003a5170 items=0 ppid=3894 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373938623965623431393764666566613765373935333763613434 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.798000 audit: BPF prog-id=188 op=LOAD Dec 13 04:04:27.798000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003a51b8 items=0 ppid=3894 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373938623965623431393764666566613765373935333763613434 Dec 13 04:04:27.799000 audit: BPF prog-id=188 op=UNLOAD Dec 13 04:04:27.799000 audit: BPF prog-id=187 op=UNLOAD Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { perfmon } for pid=3935 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit[3935]: AVC avc: denied { bpf } for pid=3935 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:27.799000 audit: BPF prog-id=189 op=LOAD Dec 13 04:04:27.799000 audit[3935]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a55c8 items=0 ppid=3894 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.799000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373938623965623431393764666566613765373935333763613434 Dec 13 04:04:27.835815 env[1147]: time="2024-12-13T04:04:27.834680226Z" level=info msg="StartContainer for \"a7798b9eb4197dfefa7e79537ca44ec8f9fda4454b6d0bf3aec2097dab8baea3\" returns successfully" Dec 13 04:04:27.934000 audit[3967]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=3967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.934000 audit[3967]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd4ee841a0 a2=0 a3=7ffd4ee8418c items=0 ppid=2020 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:27.940000 audit[3967]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=3967 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:27.940000 audit[3967]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd4ee841a0 a2=0 a3=7ffd4ee8418c items=0 ppid=2020 pid=3967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:27.940000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:28.922940 systemd-networkd[966]: cali4c392e0cbd4: Gained IPv6LL Dec 13 04:04:28.948263 kubelet[1926]: I1213 04:04:28.948165 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-4htdt" podStartSLOduration=48.948128964 podStartE2EDuration="48.948128964s" podCreationTimestamp="2024-12-13 04:03:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 04:04:27.916393415 +0000 UTC m=+49.059367705" watchObservedRunningTime="2024-12-13 04:04:28.948128964 +0000 UTC m=+50.091103285" Dec 13 04:04:29.315000 audit[3969]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:29.315000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdd089f310 a2=0 a3=7ffdd089f2fc items=0 ppid=2020 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:29.315000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:29.360000 audit[3969]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:29.360000 audit[3969]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdd089f310 a2=0 a3=7ffdd089f2fc items=0 ppid=2020 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:29.360000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:30.799739 env[1147]: time="2024-12-13T04:04:30.799669070Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:30.814400 env[1147]: time="2024-12-13T04:04:30.814341412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:30.823524 env[1147]: time="2024-12-13T04:04:30.823429727Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:30.833699 env[1147]: time="2024-12-13T04:04:30.833622688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:30.835670 env[1147]: time="2024-12-13T04:04:30.835595069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 04:04:30.847822 env[1147]: time="2024-12-13T04:04:30.847492129Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 04:04:30.852379 env[1147]: time="2024-12-13T04:04:30.848956288Z" level=info msg="CreateContainer within sandbox \"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 04:04:30.915462 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1513968283.mount: Deactivated successfully. Dec 13 04:04:30.926338 env[1147]: time="2024-12-13T04:04:30.926179264Z" level=info msg="CreateContainer within sandbox \"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"a7760fbe3d72d2ef83798901405927156697e2cce5a33327e76d4068062c3568\"" Dec 13 04:04:30.931794 env[1147]: time="2024-12-13T04:04:30.931536878Z" level=info msg="StartContainer for \"a7760fbe3d72d2ef83798901405927156697e2cce5a33327e76d4068062c3568\"" Dec 13 04:04:30.991472 systemd[1]: Started cri-containerd-a7760fbe3d72d2ef83798901405927156697e2cce5a33327e76d4068062c3568.scope. Dec 13 04:04:31.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.022000 audit: BPF prog-id=190 op=LOAD Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3410 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373630666265336437326432656638333739383930313430353932 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3410 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373630666265336437326432656638333739383930313430353932 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit: BPF prog-id=191 op=LOAD Dec 13 04:04:31.024000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000259d00 items=0 ppid=3410 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373630666265336437326432656638333739383930313430353932 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit: BPF prog-id=192 op=LOAD Dec 13 04:04:31.024000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000259d48 items=0 ppid=3410 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373630666265336437326432656638333739383930313430353932 Dec 13 04:04:31.024000 audit: BPF prog-id=192 op=UNLOAD Dec 13 04:04:31.024000 audit: BPF prog-id=191 op=UNLOAD Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:31.024000 audit: BPF prog-id=193 op=LOAD Dec 13 04:04:31.024000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c0158 items=0 ppid=3410 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137373630666265336437326432656638333739383930313430353932 Dec 13 04:04:31.072666 env[1147]: time="2024-12-13T04:04:31.072556549Z" level=info msg="StartContainer for \"a7760fbe3d72d2ef83798901405927156697e2cce5a33327e76d4068062c3568\" returns successfully" Dec 13 04:04:31.659000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.659000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.659000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0003b6d20 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:31.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:31.659000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000b2b500 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:31.659000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:31.839000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.839000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fd46120 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:31.839000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.839000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00fb17290 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:31.848000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.848000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fb17620 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.848000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:31.849000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524549 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.849000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00fb17650 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.849000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:31.913000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.913000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fc7c040 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.913000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:31.914000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:31.914000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00fbbebd0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:04:31.914000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:04:32.076860 kernel: kauditd_printk_skb: 206 callbacks suppressed Dec 13 04:04:32.078532 kernel: audit: type=1325 audit(1734062672.070:1308): table=filter:111 family=2 entries=10 op=nft_register_rule pid=4015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:32.070000 audit[4015]: NETFILTER_CFG table=filter:111 family=2 entries=10 op=nft_register_rule pid=4015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:32.070000 audit[4015]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc3b404650 a2=0 a3=7ffc3b40463c items=0 ppid=2020 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:32.070000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:32.102400 kernel: audit: type=1300 audit(1734062672.070:1308): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffc3b404650 a2=0 a3=7ffc3b40463c items=0 ppid=2020 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:32.102485 kernel: audit: type=1327 audit(1734062672.070:1308): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:32.085000 audit[4015]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:32.085000 audit[4015]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc3b404650 a2=0 a3=7ffc3b40463c items=0 ppid=2020 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:32.114687 kernel: audit: type=1325 audit(1734062672.085:1309): table=nat:112 family=2 entries=20 op=nft_register_rule pid=4015 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:32.114838 kernel: audit: type=1300 audit(1734062672.085:1309): arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc3b404650 a2=0 a3=7ffc3b40463c items=0 ppid=2020 pid=4015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:32.114868 kernel: audit: type=1327 audit(1734062672.085:1309): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:32.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:32.460000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.4230341027/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c27,c599 tclass=file permissive=0 Dec 13 04:04:32.466794 kernel: audit: type=1400 audit(1734062672.460:1310): avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.4230341027/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c27,c599 tclass=file permissive=0 Dec 13 04:04:32.460000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022a4160 a2=fc6 a3=0 items=0 ppid=3410 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 key=(null) Dec 13 04:04:32.460000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:04:32.481868 kernel: audit: type=1300 audit(1734062672.460:1310): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022a4160 a2=fc6 a3=0 items=0 ppid=3410 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 key=(null) Dec 13 04:04:32.481951 kernel: audit: type=1327 audit(1734062672.460:1310): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:04:32.927555 kubelet[1926]: I1213 04:04:32.927481 1926 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 04:04:33.347413 systemd[1]: run-containerd-runc-k8s.io-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1-runc.QcxPgj.mount: Deactivated successfully. Dec 13 04:04:33.435732 env[1147]: time="2024-12-13T04:04:33.435659352Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.439247 env[1147]: time="2024-12-13T04:04:33.439194036Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.443564 env[1147]: time="2024-12-13T04:04:33.443475648Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.446954 env[1147]: time="2024-12-13T04:04:33.446896550Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.448380 env[1147]: time="2024-12-13T04:04:33.448320935Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 04:04:33.452706 env[1147]: time="2024-12-13T04:04:33.452653854Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 04:04:33.459638 env[1147]: time="2024-12-13T04:04:33.459575737Z" level=info msg="CreateContainer within sandbox \"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 04:04:33.507502 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2615773125.mount: Deactivated successfully. Dec 13 04:04:33.525744 env[1147]: time="2024-12-13T04:04:33.525657249Z" level=info msg="CreateContainer within sandbox \"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"db44afa5a6778df96658230a745065954eb3df54fd75003fdf189b449336ee36\"" Dec 13 04:04:33.526880 env[1147]: time="2024-12-13T04:04:33.526823772Z" level=info msg="StartContainer for \"db44afa5a6778df96658230a745065954eb3df54fd75003fdf189b449336ee36\"" Dec 13 04:04:33.566097 systemd[1]: Started cri-containerd-db44afa5a6778df96658230a745065954eb3df54fd75003fdf189b449336ee36.scope. Dec 13 04:04:33.596215 kernel: audit: type=1400 audit(1734062673.590:1311): avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f1ab8f89bd8 items=0 ppid=3509 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:33.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343461666135613637373864663936363538323330613734353036 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.590000 audit: BPF prog-id=194 op=LOAD Dec 13 04:04:33.590000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a07c8 items=0 ppid=3509 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:33.590000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343461666135613637373864663936363538323330613734353036 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.596000 audit: BPF prog-id=195 op=LOAD Dec 13 04:04:33.596000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a0818 items=0 ppid=3509 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:33.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343461666135613637373864663936363538323330613734353036 Dec 13 04:04:33.597000 audit: BPF prog-id=195 op=UNLOAD Dec 13 04:04:33.597000 audit: BPF prog-id=194 op=UNLOAD Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { perfmon } for pid=4045 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit[4045]: AVC avc: denied { bpf } for pid=4045 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:33.597000 audit: BPF prog-id=196 op=LOAD Dec 13 04:04:33.597000 audit[4045]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a08a8 items=0 ppid=3509 pid=4045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:33.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462343461666135613637373864663936363538323330613734353036 Dec 13 04:04:33.603760 kubelet[1926]: I1213 04:04:33.603695 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-76b85ff8db-kplzx" podStartSLOduration=36.177262944 podStartE2EDuration="41.603670239s" podCreationTimestamp="2024-12-13 04:03:52 +0000 UTC" firstStartedPulling="2024-12-13 04:04:25.414422037 +0000 UTC m=+46.557396317" lastFinishedPulling="2024-12-13 04:04:30.840829292 +0000 UTC m=+51.983803612" observedRunningTime="2024-12-13 04:04:31.945316708 +0000 UTC m=+53.088291019" watchObservedRunningTime="2024-12-13 04:04:33.603670239 +0000 UTC m=+54.746644519" Dec 13 04:04:33.626091 env[1147]: time="2024-12-13T04:04:33.626033158Z" level=info msg="StartContainer for \"db44afa5a6778df96658230a745065954eb3df54fd75003fdf189b449336ee36\" returns successfully" Dec 13 04:04:33.870331 env[1147]: time="2024-12-13T04:04:33.870257599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.873550 env[1147]: time="2024-12-13T04:04:33.873497753Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.876432 env[1147]: time="2024-12-13T04:04:33.876344891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.879908 env[1147]: time="2024-12-13T04:04:33.879853997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:33.881307 env[1147]: time="2024-12-13T04:04:33.881252113Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 04:04:33.888866 env[1147]: time="2024-12-13T04:04:33.887832868Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 04:04:33.896077 env[1147]: time="2024-12-13T04:04:33.896008137Z" level=info msg="CreateContainer within sandbox \"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 04:04:33.921425 env[1147]: time="2024-12-13T04:04:33.921309976Z" level=info msg="CreateContainer within sandbox \"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f29e03a7bf2477485f5b0e7559232c92ef81b53ba6c3a1b4ddec37b2eef78fe3\"" Dec 13 04:04:33.922493 env[1147]: time="2024-12-13T04:04:33.922393985Z" level=info msg="StartContainer for \"f29e03a7bf2477485f5b0e7559232c92ef81b53ba6c3a1b4ddec37b2eef78fe3\"" Dec 13 04:04:33.971607 systemd[1]: Started cri-containerd-f29e03a7bf2477485f5b0e7559232c92ef81b53ba6c3a1b4ddec37b2eef78fe3.scope. Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.007000 audit: BPF prog-id=197 op=LOAD Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3550 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396530336137626632343737343835663562306537353539323332 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3550 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396530336137626632343737343835663562306537353539323332 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.008000 audit: BPF prog-id=198 op=LOAD Dec 13 04:04:34.008000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000255960 items=0 ppid=3550 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:34.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396530336137626632343737343835663562306537353539323332 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.009000 audit: BPF prog-id=199 op=LOAD Dec 13 04:04:34.009000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002559a8 items=0 ppid=3550 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:34.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396530336137626632343737343835663562306537353539323332 Dec 13 04:04:34.011000 audit: BPF prog-id=199 op=UNLOAD Dec 13 04:04:34.011000 audit: BPF prog-id=198 op=UNLOAD Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { perfmon } for pid=4081 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit[4081]: AVC avc: denied { bpf } for pid=4081 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:34.011000 audit: BPF prog-id=200 op=LOAD Dec 13 04:04:34.011000 audit[4081]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000255db8 items=0 ppid=3550 pid=4081 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:34.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632396530336137626632343737343835663562306537353539323332 Dec 13 04:04:34.050610 env[1147]: time="2024-12-13T04:04:34.050527102Z" level=info msg="StartContainer for \"f29e03a7bf2477485f5b0e7559232c92ef81b53ba6c3a1b4ddec37b2eef78fe3\" returns successfully" Dec 13 04:04:35.002000 audit[4111]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:35.002000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd465d1be0 a2=0 a3=7ffd465d1bcc items=0 ppid=2020 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:35.002000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:35.006000 audit[4111]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4111 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:35.006000 audit[4111]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd465d1be0 a2=0 a3=7ffd465d1bcc items=0 ppid=2020 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:35.006000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:35.498000 audit[4092]: AVC avc: denied { watch } for pid=4092 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.3903584844/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c579 tclass=file permissive=0 Dec 13 04:04:35.498000 audit[4092]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bdab20 a2=fc6 a3=0 items=0 ppid=3550 pid=4092 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 key=(null) Dec 13 04:04:35.498000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:04:35.544796 kubelet[1926]: I1213 04:04:35.544485 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-76b85ff8db-lnkts" podStartSLOduration=35.188292158 podStartE2EDuration="43.54446864s" podCreationTimestamp="2024-12-13 04:03:52 +0000 UTC" firstStartedPulling="2024-12-13 04:04:25.530457192 +0000 UTC m=+46.673431472" lastFinishedPulling="2024-12-13 04:04:33.886633634 +0000 UTC m=+55.029607954" observedRunningTime="2024-12-13 04:04:34.971061661 +0000 UTC m=+56.114036011" watchObservedRunningTime="2024-12-13 04:04:35.54446864 +0000 UTC m=+56.687442910" Dec 13 04:04:35.567000 audit[4113]: NETFILTER_CFG table=filter:115 family=2 entries=9 op=nft_register_rule pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:35.567000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffe7e150760 a2=0 a3=7ffe7e15074c items=0 ppid=2020 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:35.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:35.573000 audit[4113]: NETFILTER_CFG table=nat:116 family=2 entries=27 op=nft_register_chain pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:35.573000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe7e150760 a2=0 a3=7ffe7e15074c items=0 ppid=2020 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:35.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:38.917094 env[1147]: time="2024-12-13T04:04:38.917017536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:38.918932 env[1147]: time="2024-12-13T04:04:38.918909438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:38.921032 env[1147]: time="2024-12-13T04:04:38.920987808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:38.923480 env[1147]: time="2024-12-13T04:04:38.923448574Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:38.924167 env[1147]: time="2024-12-13T04:04:38.924140789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 04:04:38.926036 env[1147]: time="2024-12-13T04:04:38.926012874Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 04:04:38.956104 env[1147]: time="2024-12-13T04:04:38.955977542Z" level=info msg="CreateContainer within sandbox \"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 04:04:38.978133 env[1147]: time="2024-12-13T04:04:38.978088981Z" level=info msg="CreateContainer within sandbox \"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708\"" Dec 13 04:04:38.978814 env[1147]: time="2024-12-13T04:04:38.978785805Z" level=info msg="StartContainer for \"7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708\"" Dec 13 04:04:39.033253 systemd[1]: Started cri-containerd-7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708.scope. Dec 13 04:04:39.072340 env[1147]: time="2024-12-13T04:04:39.072298621Z" level=info msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" Dec 13 04:04:39.084223 kernel: kauditd_printk_skb: 114 callbacks suppressed Dec 13 04:04:39.084368 kernel: audit: type=1400 audit(1734062679.077:1340): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.089858 kernel: audit: type=1400 audit(1734062679.077:1341): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.098336 kernel: audit: type=1400 audit(1734062679.077:1342): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.098419 kernel: audit: type=1400 audit(1734062679.077:1343): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.098445 kernel: audit: type=1400 audit(1734062679.077:1344): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.105549 kernel: audit: type=1400 audit(1734062679.077:1345): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.107210 kernel: audit: type=1400 audit(1734062679.077:1346): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.113690 kernel: audit: type=1400 audit(1734062679.077:1347): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.119580 kernel: audit: type=1400 audit(1734062679.077:1348): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.119654 kernel: audit: type=1400 audit(1734062679.079:1349): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.079000 audit: BPF prog-id=201 op=LOAD Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3791 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:39.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353766386634306263366338316632323666366230373138396630 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3791 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:39.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353766386634306263366338316632323666366230373138396630 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit: BPF prog-id=202 op=LOAD Dec 13 04:04:39.088000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00039e8d0 items=0 ppid=3791 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:39.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353766386634306263366338316632323666366230373138396630 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit: BPF prog-id=203 op=LOAD Dec 13 04:04:39.088000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00039e918 items=0 ppid=3791 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:39.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353766386634306263366338316632323666366230373138396630 Dec 13 04:04:39.088000 audit: BPF prog-id=203 op=UNLOAD Dec 13 04:04:39.088000 audit: BPF prog-id=202 op=UNLOAD Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { perfmon } for pid=4131 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit[4131]: AVC avc: denied { bpf } for pid=4131 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:39.088000 audit: BPF prog-id=204 op=LOAD Dec 13 04:04:39.088000 audit[4131]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00039ed28 items=0 ppid=3791 pid=4131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:39.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735353766386634306263366338316632323666366230373138396630 Dec 13 04:04:39.191605 env[1147]: time="2024-12-13T04:04:39.191489777Z" level=info msg="StartContainer for \"7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708\" returns successfully" Dec 13 04:04:39.219000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:39.219000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:39.219000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000836180 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:39.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:39.219000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000836160 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:39.219000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:39.221000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:39.221000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008361e0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:39.221000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:39.253000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:04:39.253000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0008367c0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:04:39.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.580 [WARNING][4162] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02dbc368-79f2-4a05-bc9e-bb995dd7d205", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d", Pod:"csi-node-driver-c4vc5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d9b825519f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.584 [INFO][4162] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.584 [INFO][4162] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" iface="eth0" netns="" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.585 [INFO][4162] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.585 [INFO][4162] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.618 [INFO][4178] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.618 [INFO][4178] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.618 [INFO][4178] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.627 [WARNING][4178] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.628 [INFO][4178] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.629 [INFO][4178] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:39.633970 env[1147]: 2024-12-13 04:04:39.632 [INFO][4162] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.633970 env[1147]: time="2024-12-13T04:04:39.633785607Z" level=info msg="TearDown network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" successfully" Dec 13 04:04:39.633970 env[1147]: time="2024-12-13T04:04:39.633815413Z" level=info msg="StopPodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" returns successfully" Dec 13 04:04:39.635587 env[1147]: time="2024-12-13T04:04:39.635161031Z" level=info msg="RemovePodSandbox for \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" Dec 13 04:04:39.635587 env[1147]: time="2024-12-13T04:04:39.635198862Z" level=info msg="Forcibly stopping sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\"" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.710 [WARNING][4199] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"02dbc368-79f2-4a05-bc9e-bb995dd7d205", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d", Pod:"csi-node-driver-c4vc5", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.27.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali6d9b825519f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.711 [INFO][4199] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.711 [INFO][4199] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" iface="eth0" netns="" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.711 [INFO][4199] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.711 [INFO][4199] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.748 [INFO][4205] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.749 [INFO][4205] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.749 [INFO][4205] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.760 [WARNING][4205] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.760 [INFO][4205] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" HandleID="k8s-pod-network.b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-csi--node--driver--c4vc5-eth0" Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.765 [INFO][4205] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:39.770864 env[1147]: 2024-12-13 04:04:39.769 [INFO][4199] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699" Dec 13 04:04:39.895107 env[1147]: time="2024-12-13T04:04:39.771694120Z" level=info msg="TearDown network for sandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" successfully" Dec 13 04:04:40.209126 kubelet[1926]: I1213 04:04:40.208921 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79d4cbddb8-5gn6s" podStartSLOduration=34.777414841 podStartE2EDuration="47.208901842s" podCreationTimestamp="2024-12-13 04:03:53 +0000 UTC" firstStartedPulling="2024-12-13 04:04:26.494028802 +0000 UTC m=+47.637003082" lastFinishedPulling="2024-12-13 04:04:38.925515813 +0000 UTC m=+60.068490083" observedRunningTime="2024-12-13 04:04:40.208639882 +0000 UTC m=+61.351614182" watchObservedRunningTime="2024-12-13 04:04:40.208901842 +0000 UTC m=+61.351876112" Dec 13 04:04:40.225949 env[1147]: time="2024-12-13T04:04:40.225903209Z" level=info msg="RemovePodSandbox \"b6e9607e9a75fd29042fecb7e3e5b1a3a1718a132175a482f98de3d85182a699\" returns successfully" Dec 13 04:04:40.234106 env[1147]: time="2024-12-13T04:04:40.234057854Z" level=info msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" Dec 13 04:04:40.283417 systemd[1]: run-containerd-runc-k8s.io-7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708-runc.w4MJR4.mount: Deactivated successfully. Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.362 [WARNING][4235] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521", Pod:"calico-apiserver-76b85ff8db-lnkts", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia336f972ef5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.364 [INFO][4235] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.364 [INFO][4235] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" iface="eth0" netns="" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.364 [INFO][4235] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.364 [INFO][4235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.423 [INFO][4249] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.423 [INFO][4249] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.423 [INFO][4249] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.435 [WARNING][4249] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.435 [INFO][4249] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.440 [INFO][4249] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:40.443914 env[1147]: 2024-12-13 04:04:40.442 [INFO][4235] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.446651 env[1147]: time="2024-12-13T04:04:40.444306809Z" level=info msg="TearDown network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" successfully" Dec 13 04:04:40.446651 env[1147]: time="2024-12-13T04:04:40.444354639Z" level=info msg="StopPodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" returns successfully" Dec 13 04:04:40.446651 env[1147]: time="2024-12-13T04:04:40.445759469Z" level=info msg="RemovePodSandbox for \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" Dec 13 04:04:40.446651 env[1147]: time="2024-12-13T04:04:40.445832957Z" level=info msg="Forcibly stopping sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\"" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.504 [WARNING][4270] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"ae8d4ab6-29fd-4569-9b0f-d0fd8b6ebd3b", ResourceVersion:"851", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"1987898277459cde286a2a85c8eca7ae242377a16cc89acc283a1208f7eca521", Pod:"calico-apiserver-76b85ff8db-lnkts", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia336f972ef5", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.504 [INFO][4270] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.504 [INFO][4270] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" iface="eth0" netns="" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.504 [INFO][4270] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.504 [INFO][4270] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.542 [INFO][4276] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.542 [INFO][4276] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.542 [INFO][4276] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.560 [WARNING][4276] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.560 [INFO][4276] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" HandleID="k8s-pod-network.2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--lnkts-eth0" Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.562 [INFO][4276] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:40.566216 env[1147]: 2024-12-13 04:04:40.564 [INFO][4270] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38" Dec 13 04:04:40.567009 env[1147]: time="2024-12-13T04:04:40.566950579Z" level=info msg="TearDown network for sandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" successfully" Dec 13 04:04:40.571661 env[1147]: time="2024-12-13T04:04:40.571600734Z" level=info msg="RemovePodSandbox \"2b542f643afb795c09ab6ad7d189a3b271e53606c020f5f86e793c2cb090cf38\" returns successfully" Dec 13 04:04:40.572252 env[1147]: time="2024-12-13T04:04:40.572228709Z" level=info msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.635 [WARNING][4295] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b52d933-866c-4c1d-b57c-83fb51ac132b", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00", Pod:"calico-apiserver-76b85ff8db-kplzx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calice51b79305d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.636 [INFO][4295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.636 [INFO][4295] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" iface="eth0" netns="" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.636 [INFO][4295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.636 [INFO][4295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.678 [INFO][4301] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.678 [INFO][4301] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.678 [INFO][4301] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.687 [WARNING][4301] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.687 [INFO][4301] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.689 [INFO][4301] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:40.692578 env[1147]: 2024-12-13 04:04:40.691 [INFO][4295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.693250 env[1147]: time="2024-12-13T04:04:40.693208373Z" level=info msg="TearDown network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" successfully" Dec 13 04:04:40.693333 env[1147]: time="2024-12-13T04:04:40.693314512Z" level=info msg="StopPodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" returns successfully" Dec 13 04:04:40.693931 env[1147]: time="2024-12-13T04:04:40.693907511Z" level=info msg="RemovePodSandbox for \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" Dec 13 04:04:40.694473 env[1147]: time="2024-12-13T04:04:40.694430571Z" level=info msg="Forcibly stopping sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\"" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.770 [WARNING][4322] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0", GenerateName:"calico-apiserver-76b85ff8db-", Namespace:"calico-apiserver", SelfLink:"", UID:"4b52d933-866c-4c1d-b57c-83fb51ac132b", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76b85ff8db", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"bb368d62315e691459620980171a010cbe178a564c86f0a06899e26d3d1a8a00", Pod:"calico-apiserver-76b85ff8db-kplzx", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.27.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calice51b79305d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.770 [INFO][4322] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.770 [INFO][4322] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" iface="eth0" netns="" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.770 [INFO][4322] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.770 [INFO][4322] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.807 [INFO][4328] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.807 [INFO][4328] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.807 [INFO][4328] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.820 [WARNING][4328] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.821 [INFO][4328] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" HandleID="k8s-pod-network.5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--apiserver--76b85ff8db--kplzx-eth0" Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.823 [INFO][4328] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:40.828182 env[1147]: 2024-12-13 04:04:40.826 [INFO][4322] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f" Dec 13 04:04:40.829938 env[1147]: time="2024-12-13T04:04:40.829895350Z" level=info msg="TearDown network for sandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" successfully" Dec 13 04:04:40.912022 env[1147]: time="2024-12-13T04:04:40.911985082Z" level=info msg="RemovePodSandbox \"5c623be69f18bf4f76610179c1d35249aabbec5b187e9cfad7d2364a7b1c348f\" returns successfully" Dec 13 04:04:40.912645 env[1147]: time="2024-12-13T04:04:40.912622215Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.018 [WARNING][4349] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0", GenerateName:"calico-kube-controllers-79d4cbddb8-", Namespace:"calico-system", SelfLink:"", UID:"4408bdef-bdcb-4b03-a17f-062e757020c1", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79d4cbddb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec", Pod:"calico-kube-controllers-79d4cbddb8-5gn6s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7362fe6b186", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.018 [INFO][4349] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.018 [INFO][4349] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.018 [INFO][4349] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.019 [INFO][4349] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.068 [INFO][4355] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.068 [INFO][4355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.068 [INFO][4355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.087 [WARNING][4355] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.091 [INFO][4355] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.095 [INFO][4355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:41.098999 env[1147]: 2024-12-13 04:04:41.096 [INFO][4349] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.098999 env[1147]: time="2024-12-13T04:04:41.098914762Z" level=info msg="TearDown network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" successfully" Dec 13 04:04:41.098999 env[1147]: time="2024-12-13T04:04:41.098953404Z" level=info msg="StopPodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" returns successfully" Dec 13 04:04:41.100880 env[1147]: time="2024-12-13T04:04:41.100846589Z" level=info msg="RemovePodSandbox for \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:41.100949 env[1147]: time="2024-12-13T04:04:41.100885402Z" level=info msg="Forcibly stopping sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\"" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.195 [WARNING][4376] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0", GenerateName:"calico-kube-controllers-79d4cbddb8-", Namespace:"calico-system", SelfLink:"", UID:"4408bdef-bdcb-4b03-a17f-062e757020c1", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 53, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79d4cbddb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"de611383fe94f82a0413acf939de7c1fe3f3fa121b7c92385bab1f07d07a77ec", Pod:"calico-kube-controllers-79d4cbddb8-5gn6s", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.27.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali7362fe6b186", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.197 [INFO][4376] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.197 [INFO][4376] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" iface="eth0" netns="" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.197 [INFO][4376] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.197 [INFO][4376] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.255 [INFO][4382] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.255 [INFO][4382] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.255 [INFO][4382] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.267 [WARNING][4382] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.267 [INFO][4382] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" HandleID="k8s-pod-network.4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-calico--kube--controllers--79d4cbddb8--5gn6s-eth0" Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.271 [INFO][4382] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:41.276907 env[1147]: 2024-12-13 04:04:41.274 [INFO][4376] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9" Dec 13 04:04:41.278378 env[1147]: time="2024-12-13T04:04:41.277645820Z" level=info msg="TearDown network for sandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" successfully" Dec 13 04:04:41.281853 env[1147]: time="2024-12-13T04:04:41.281815326Z" level=info msg="RemovePodSandbox \"4a24b51cbe555010698a1aa67fbaacb9a04c239a5828f6ed39e4db2d7d417ce9\" returns successfully" Dec 13 04:04:41.282715 env[1147]: time="2024-12-13T04:04:41.282693119Z" level=info msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.389 [WARNING][4401] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05f405fc-50fb-4f02-9ce2-d06cefea988c", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b", Pod:"coredns-6f6b679f8f-4htdt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4c392e0cbd4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.389 [INFO][4401] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.389 [INFO][4401] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" iface="eth0" netns="" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.389 [INFO][4401] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.389 [INFO][4401] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.440 [INFO][4407] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.440 [INFO][4407] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.441 [INFO][4407] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.461 [WARNING][4407] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.461 [INFO][4407] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.465 [INFO][4407] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:41.472844 env[1147]: 2024-12-13 04:04:41.468 [INFO][4401] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.478122 env[1147]: time="2024-12-13T04:04:41.473347259Z" level=info msg="TearDown network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" successfully" Dec 13 04:04:41.478122 env[1147]: time="2024-12-13T04:04:41.473384940Z" level=info msg="StopPodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" returns successfully" Dec 13 04:04:41.478122 env[1147]: time="2024-12-13T04:04:41.473874807Z" level=info msg="RemovePodSandbox for \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" Dec 13 04:04:41.478122 env[1147]: time="2024-12-13T04:04:41.473911355Z" level=info msg="Forcibly stopping sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\"" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.556 [WARNING][4428] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"05f405fc-50fb-4f02-9ce2-d06cefea988c", ResourceVersion:"815", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"68d144246157326357369cb5b6b131dac5239eb58a92b69a9ed4599b7589118b", Pod:"coredns-6f6b679f8f-4htdt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali4c392e0cbd4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.557 [INFO][4428] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.557 [INFO][4428] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" iface="eth0" netns="" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.557 [INFO][4428] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.557 [INFO][4428] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.606 [INFO][4434] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.606 [INFO][4434] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.606 [INFO][4434] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.614 [WARNING][4434] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.614 [INFO][4434] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" HandleID="k8s-pod-network.134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--4htdt-eth0" Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.617 [INFO][4434] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:41.621454 env[1147]: 2024-12-13 04:04:41.619 [INFO][4428] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67" Dec 13 04:04:41.623219 env[1147]: time="2024-12-13T04:04:41.621944735Z" level=info msg="TearDown network for sandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" successfully" Dec 13 04:04:41.638682 env[1147]: time="2024-12-13T04:04:41.638641392Z" level=info msg="RemovePodSandbox \"134d044ee87887a96d6e49a20fd4a84ab9b72996a1f03e4a8e39697992f12e67\" returns successfully" Dec 13 04:04:41.639384 env[1147]: time="2024-12-13T04:04:41.639362111Z" level=info msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.751 [WARNING][4453] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec7d1cca-678c-407f-a5a9-b29e2444becf", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621", Pod:"coredns-6f6b679f8f-r9gwq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9bc7131211", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.751 [INFO][4453] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.751 [INFO][4453] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" iface="eth0" netns="" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.751 [INFO][4453] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.751 [INFO][4453] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.807 [INFO][4459] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.807 [INFO][4459] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.807 [INFO][4459] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.818 [WARNING][4459] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.818 [INFO][4459] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.823 [INFO][4459] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:41.827863 env[1147]: 2024-12-13 04:04:41.825 [INFO][4453] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:41.828536 env[1147]: time="2024-12-13T04:04:41.828498029Z" level=info msg="TearDown network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" successfully" Dec 13 04:04:41.858188 env[1147]: time="2024-12-13T04:04:41.828634044Z" level=info msg="StopPodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" returns successfully" Dec 13 04:04:41.858188 env[1147]: time="2024-12-13T04:04:41.830960419Z" level=info msg="RemovePodSandbox for \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" Dec 13 04:04:41.858188 env[1147]: time="2024-12-13T04:04:41.830995784Z" level=info msg="Forcibly stopping sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\"" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.000 [WARNING][4479] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"ec7d1cca-678c-407f-a5a9-b29e2444becf", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 4, 3, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-b-9ccf4f3b90.novalocal", ContainerID:"4d9055171775633a8a713333d7d753e14da511fe480c62ff5691a8c925328621", Pod:"coredns-6f6b679f8f-r9gwq", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.27.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9bc7131211", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.000 [INFO][4479] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.000 [INFO][4479] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" iface="eth0" netns="" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.000 [INFO][4479] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.000 [INFO][4479] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.037 [INFO][4485] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.037 [INFO][4485] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.037 [INFO][4485] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.142 [WARNING][4485] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.142 [INFO][4485] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" HandleID="k8s-pod-network.a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Workload="ci--3510--3--6--b--9ccf4f3b90.novalocal-k8s-coredns--6f6b679f8f--r9gwq-eth0" Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.158 [INFO][4485] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 04:04:42.178903 env[1147]: 2024-12-13 04:04:42.161 [INFO][4479] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933" Dec 13 04:04:42.180516 env[1147]: time="2024-12-13T04:04:42.180469500Z" level=info msg="TearDown network for sandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" successfully" Dec 13 04:04:42.482647 env[1147]: time="2024-12-13T04:04:42.482367000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:42.491547 env[1147]: time="2024-12-13T04:04:42.491445727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:42.497252 env[1147]: time="2024-12-13T04:04:42.497180443Z" level=info msg="RemovePodSandbox \"a0908df52619678d37d7582eb32e76b214a66bc3cb1e130afd43bf45e6196933\" returns successfully" Dec 13 04:04:42.499243 env[1147]: time="2024-12-13T04:04:42.499189084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:42.505822 env[1147]: time="2024-12-13T04:04:42.505702638Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 04:04:42.507086 env[1147]: time="2024-12-13T04:04:42.506996840Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 04:04:42.514396 env[1147]: time="2024-12-13T04:04:42.514326774Z" level=info msg="CreateContainer within sandbox \"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 04:04:42.560760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1127817896.mount: Deactivated successfully. Dec 13 04:04:42.567773 env[1147]: time="2024-12-13T04:04:42.567718411Z" level=info msg="CreateContainer within sandbox \"a75828bba3056c782ee589695231a1437093a61c4588a5076c4b248e0ceab03d\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3876ca9b52dc776183b0051873d63a31efde9b601a1ecda37141f9225a81e9cd\"" Dec 13 04:04:42.568853 env[1147]: time="2024-12-13T04:04:42.568819582Z" level=info msg="StartContainer for \"3876ca9b52dc776183b0051873d63a31efde9b601a1ecda37141f9225a81e9cd\"" Dec 13 04:04:42.603092 systemd[1]: Started cri-containerd-3876ca9b52dc776183b0051873d63a31efde9b601a1ecda37141f9225a81e9cd.scope. Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f96ad622010 items=0 ppid=3509 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:42.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373663613962353264633737363138336230303531383733643633 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.658000 audit: BPF prog-id=205 op=LOAD Dec 13 04:04:42.658000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003e0358 items=0 ppid=3509 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:42.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373663613962353264633737363138336230303531383733643633 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.661000 audit: BPF prog-id=206 op=LOAD Dec 13 04:04:42.661000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003e03a8 items=0 ppid=3509 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:42.661000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373663613962353264633737363138336230303531383733643633 Dec 13 04:04:42.661000 audit: BPF prog-id=206 op=UNLOAD Dec 13 04:04:42.662000 audit: BPF prog-id=205 op=UNLOAD Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { perfmon } for pid=4498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit[4498]: AVC avc: denied { bpf } for pid=4498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 04:04:42.662000 audit: BPF prog-id=207 op=LOAD Dec 13 04:04:42.662000 audit[4498]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003e0438 items=0 ppid=3509 pid=4498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:42.662000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338373663613962353264633737363138336230303531383733643633 Dec 13 04:04:42.693731 env[1147]: time="2024-12-13T04:04:42.693670934Z" level=info msg="StartContainer for \"3876ca9b52dc776183b0051873d63a31efde9b601a1ecda37141f9225a81e9cd\" returns successfully" Dec 13 04:04:43.236482 kubelet[1926]: I1213 04:04:43.236427 1926 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-c4vc5" podStartSLOduration=34.219444526 podStartE2EDuration="51.236403592s" podCreationTimestamp="2024-12-13 04:03:52 +0000 UTC" firstStartedPulling="2024-12-13 04:04:25.493287639 +0000 UTC m=+46.636261909" lastFinishedPulling="2024-12-13 04:04:42.510246655 +0000 UTC m=+63.653220975" observedRunningTime="2024-12-13 04:04:43.236160507 +0000 UTC m=+64.379134797" watchObservedRunningTime="2024-12-13 04:04:43.236403592 +0000 UTC m=+64.379377872" Dec 13 04:04:43.545618 systemd[1]: run-containerd-runc-k8s.io-3876ca9b52dc776183b0051873d63a31efde9b601a1ecda37141f9225a81e9cd-runc.gNwnCW.mount: Deactivated successfully. Dec 13 04:04:43.710370 kubelet[1926]: I1213 04:04:43.710315 1926 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 04:04:43.713614 kubelet[1926]: I1213 04:04:43.713556 1926 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 04:04:46.548450 kubelet[1926]: I1213 04:04:46.548370 1926 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 04:04:46.633000 audit[4536]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:46.636095 kernel: kauditd_printk_skb: 102 callbacks suppressed Dec 13 04:04:46.636182 kernel: audit: type=1325 audit(1734062686.633:1368): table=filter:117 family=2 entries=8 op=nft_register_rule pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:46.633000 audit[4536]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc4c0c6230 a2=0 a3=7ffc4c0c621c items=0 ppid=2020 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:46.644504 kernel: audit: type=1300 audit(1734062686.633:1368): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc4c0c6230 a2=0 a3=7ffc4c0c621c items=0 ppid=2020 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:46.644729 kernel: audit: type=1327 audit(1734062686.633:1368): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:46.633000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:46.649000 audit[4536]: NETFILTER_CFG table=nat:118 family=2 entries=34 op=nft_register_chain pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:46.649000 audit[4536]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc4c0c6230 a2=0 a3=7ffc4c0c621c items=0 ppid=2020 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:46.659066 kernel: audit: type=1325 audit(1734062686.649:1369): table=nat:118 family=2 entries=34 op=nft_register_chain pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:04:46.659145 kernel: audit: type=1300 audit(1734062686.649:1369): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc4c0c6230 a2=0 a3=7ffc4c0c621c items=0 ppid=2020 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:04:46.659184 kernel: audit: type=1327 audit(1734062686.649:1369): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:04:46.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:05:07.990045 systemd[1]: Started sshd@7-172.24.4.161:22-172.24.4.1:59228.service. Dec 13 04:05:08.005283 kernel: audit: type=1130 audit(1734062707.992:1370): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.161:22-172.24.4.1:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:07.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.161:22-172.24.4.1:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:09.844000 audit[4579]: USER_ACCT pid=4579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.851584 sshd[4579]: Accepted publickey for core from 172.24.4.1 port 59228 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:09.861716 kernel: audit: type=1101 audit(1734062709.844:1371): pid=4579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.861826 kernel: audit: type=1103 audit(1734062709.850:1372): pid=4579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.861856 kernel: audit: type=1006 audit(1734062709.850:1373): pid=4579 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Dec 13 04:05:09.850000 audit[4579]: CRED_ACQ pid=4579 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.850000 audit[4579]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd67b3bc50 a2=3 a3=0 items=0 ppid=1 pid=4579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:09.871807 kernel: audit: type=1300 audit(1734062709.850:1373): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd67b3bc50 a2=3 a3=0 items=0 ppid=1 pid=4579 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:09.871852 kernel: audit: type=1327 audit(1734062709.850:1373): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:09.850000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:09.858247 sshd[4579]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:09.888831 systemd-logind[1136]: New session 8 of user core. Dec 13 04:05:09.889518 systemd[1]: Started session-8.scope. Dec 13 04:05:09.899000 audit[4579]: USER_START pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.906940 kernel: audit: type=1105 audit(1734062709.899:1374): pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.905000 audit[4601]: CRED_ACQ pid=4601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:09.911794 kernel: audit: type=1103 audit(1734062709.905:1375): pid=4601 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:11.519446 sshd[4579]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:11.519000 audit[4579]: USER_END pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:11.527277 systemd[1]: sshd@7-172.24.4.161:22-172.24.4.1:59228.service: Deactivated successfully. Dec 13 04:05:11.528173 kernel: audit: type=1106 audit(1734062711.519:1376): pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:11.528163 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 04:05:11.519000 audit[4579]: CRED_DISP pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:11.533399 kernel: audit: type=1104 audit(1734062711.519:1377): pid=4579 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:11.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.161:22-172.24.4.1:59228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:11.532803 systemd-logind[1136]: Session 8 logged out. Waiting for processes to exit. Dec 13 04:05:11.534304 systemd-logind[1136]: Removed session 8. Dec 13 04:05:16.528603 systemd[1]: Started sshd@8-172.24.4.161:22-172.24.4.1:58918.service. Dec 13 04:05:16.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.161:22-172.24.4.1:58918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:16.534433 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:05:16.534583 kernel: audit: type=1130 audit(1734062716.527:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.161:22-172.24.4.1:58918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:18.023000 audit[4614]: USER_ACCT pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.025521 sshd[4614]: Accepted publickey for core from 172.24.4.1 port 58918 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:18.038873 kernel: audit: type=1101 audit(1734062718.023:1380): pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.040000 audit[4614]: CRED_ACQ pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.055884 kernel: audit: type=1103 audit(1734062718.040:1381): pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.056052 kernel: audit: type=1006 audit(1734062718.040:1382): pid=4614 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Dec 13 04:05:18.056470 sshd[4614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:18.040000 audit[4614]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe65265500 a2=3 a3=0 items=0 ppid=1 pid=4614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:18.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:18.081486 kernel: audit: type=1300 audit(1734062718.040:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe65265500 a2=3 a3=0 items=0 ppid=1 pid=4614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:18.081543 kernel: audit: type=1327 audit(1734062718.040:1382): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:18.085898 systemd[1]: Started session-9.scope. Dec 13 04:05:18.085909 systemd-logind[1136]: New session 9 of user core. Dec 13 04:05:18.096000 audit[4614]: USER_START pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.108825 kernel: audit: type=1105 audit(1734062718.096:1383): pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.096000 audit[4616]: CRED_ACQ pid=4616 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.113830 kernel: audit: type=1103 audit(1734062718.096:1384): pid=4616 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.857267 sshd[4614]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:18.857000 audit[4614]: USER_END pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.857000 audit[4614]: CRED_DISP pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.872120 systemd[1]: sshd@8-172.24.4.161:22-172.24.4.1:58918.service: Deactivated successfully. Dec 13 04:05:18.873737 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 04:05:18.877177 systemd-logind[1136]: Session 9 logged out. Waiting for processes to exit. Dec 13 04:05:18.879612 systemd-logind[1136]: Removed session 9. Dec 13 04:05:18.881140 kernel: audit: type=1106 audit(1734062718.857:1385): pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.881298 kernel: audit: type=1104 audit(1734062718.857:1386): pid=4614 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:18.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.161:22-172.24.4.1:58918 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:23.869402 systemd[1]: Started sshd@9-172.24.4.161:22-172.24.4.1:58922.service. Dec 13 04:05:23.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.161:22-172.24.4.1:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:23.873203 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:05:23.873316 kernel: audit: type=1130 audit(1734062723.868:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.161:22-172.24.4.1:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:25.145000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.150892 sshd[4626]: Accepted publickey for core from 172.24.4.1 port 58922 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:25.157980 kernel: audit: type=1101 audit(1734062725.145:1389): pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.156000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.159462 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:25.173586 kernel: audit: type=1103 audit(1734062725.156:1390): pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.173721 kernel: audit: type=1006 audit(1734062725.156:1391): pid=4626 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 04:05:25.156000 audit[4626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7fe48f80 a2=3 a3=0 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:25.176904 systemd[1]: Started session-10.scope. Dec 13 04:05:25.178996 systemd-logind[1136]: New session 10 of user core. Dec 13 04:05:25.240658 kernel: audit: type=1300 audit(1734062725.156:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7fe48f80 a2=3 a3=0 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:25.241001 kernel: audit: type=1327 audit(1734062725.156:1391): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:25.241072 kernel: audit: type=1105 audit(1734062725.198:1392): pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.241133 kernel: audit: type=1103 audit(1734062725.210:1393): pid=4628 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:25.198000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:25.210000 audit[4628]: CRED_ACQ pid=4628 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:26.026552 sshd[4626]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:26.026000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:26.084476 kernel: audit: type=1106 audit(1734062726.026:1394): pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:26.084608 kernel: audit: type=1104 audit(1734062726.027:1395): pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:26.027000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:26.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.161:22-172.24.4.1:58922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:26.041747 systemd[1]: sshd@9-172.24.4.161:22-172.24.4.1:58922.service: Deactivated successfully. Dec 13 04:05:26.043457 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 04:05:26.062222 systemd-logind[1136]: Session 10 logged out. Waiting for processes to exit. Dec 13 04:05:26.064495 systemd-logind[1136]: Removed session 10. Dec 13 04:05:30.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.161:22-172.24.4.1:38824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:30.990611 systemd[1]: Started sshd@10-172.24.4.161:22-172.24.4.1:38824.service. Dec 13 04:05:30.995826 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:05:30.995982 kernel: audit: type=1130 audit(1734062730.989:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.161:22-172.24.4.1:38824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:31.671000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.683844 kernel: audit: type=1400 audit(1734062731.671:1398): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.684057 kernel: audit: type=1400 audit(1734062731.671:1399): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.671000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.671000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00205e2d0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:31.708250 kernel: audit: type=1300 audit(1734062731.671:1399): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00205e2d0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:31.708428 kernel: audit: type=1327 audit(1734062731.671:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:31.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:31.671000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002081c40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:31.671000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:31.746004 kernel: audit: type=1300 audit(1734062731.671:1398): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002081c40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:31.746214 kernel: audit: type=1327 audit(1734062731.671:1398): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:31.850000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.862815 kernel: audit: type=1400 audit(1734062731.850:1400): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.862982 kernel: audit: type=1300 audit(1734062731.850:1400): arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00f4dc8a0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.850000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c00f4dc8a0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.890528 kernel: audit: type=1327 audit(1734062731.850:1400): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.850000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.850000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c012276ab0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.851000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524549 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.851000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012276ae0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.851000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.858000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.858000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c012276b70 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.916000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.916000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c01270e960 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.916000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:31.917000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:31.917000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00e885740 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:05:31.917000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:05:32.148000 audit[4638]: USER_ACCT pid=4638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:32.151269 sshd[4638]: Accepted publickey for core from 172.24.4.1 port 38824 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:32.150000 audit[4638]: CRED_ACQ pid=4638 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:32.150000 audit[4638]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe37f6cd90 a2=3 a3=0 items=0 ppid=1 pid=4638 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:32.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:32.153160 sshd[4638]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:32.163101 systemd-logind[1136]: New session 11 of user core. Dec 13 04:05:32.165134 systemd[1]: Started session-11.scope. Dec 13 04:05:32.177000 audit[4638]: USER_START pid=4638 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:32.181000 audit[4640]: CRED_ACQ pid=4640 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:32.461000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.4230341027/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c27,c599 tclass=file permissive=0 Dec 13 04:05:32.461000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022a5c40 a2=fc6 a3=0 items=0 ppid=3410 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 key=(null) Dec 13 04:05:32.461000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:05:33.528026 sshd[4638]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:33.530000 audit[4638]: USER_END pid=4638 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:33.530000 audit[4638]: CRED_DISP pid=4638 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:33.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.161:22-172.24.4.1:38832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:33.536982 systemd[1]: Started sshd@11-172.24.4.161:22-172.24.4.1:38832.service. Dec 13 04:05:33.538329 systemd[1]: sshd@10-172.24.4.161:22-172.24.4.1:38824.service: Deactivated successfully. Dec 13 04:05:33.538000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.161:22-172.24.4.1:38824 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:33.542013 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 04:05:33.550130 systemd-logind[1136]: Session 11 logged out. Waiting for processes to exit. Dec 13 04:05:33.553473 systemd-logind[1136]: Removed session 11. Dec 13 04:05:34.647000 audit[4671]: USER_ACCT pid=4671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:34.649540 sshd[4671]: Accepted publickey for core from 172.24.4.1 port 38832 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:34.649000 audit[4671]: CRED_ACQ pid=4671 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:34.649000 audit[4671]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff83ef5e0 a2=3 a3=0 items=0 ppid=1 pid=4671 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:34.649000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:34.652677 sshd[4671]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:34.663331 systemd-logind[1136]: New session 12 of user core. Dec 13 04:05:34.665367 systemd[1]: Started session-12.scope. Dec 13 04:05:34.674000 audit[4671]: USER_START pid=4671 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:34.677000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:35.428677 systemd[1]: Started sshd@12-172.24.4.161:22-172.24.4.1:41256.service. Dec 13 04:05:35.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.161:22-172.24.4.1:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:35.438174 sshd[4671]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:35.440000 audit[4671]: USER_END pid=4671 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:35.453000 audit[4671]: CRED_DISP pid=4671 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:35.458962 systemd[1]: sshd@11-172.24.4.161:22-172.24.4.1:38832.service: Deactivated successfully. Dec 13 04:05:35.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.161:22-172.24.4.1:38832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:35.461141 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 04:05:35.464653 systemd-logind[1136]: Session 12 logged out. Waiting for processes to exit. Dec 13 04:05:35.466626 systemd-logind[1136]: Removed session 12. Dec 13 04:05:35.498000 audit[4092]: AVC avc: denied { watch } for pid=4092 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.3903584844/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c579 tclass=file permissive=0 Dec 13 04:05:35.498000 audit[4092]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018e7d40 a2=fc6 a3=0 items=0 ppid=3550 pid=4092 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 key=(null) Dec 13 04:05:35.498000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:05:36.915008 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 04:05:36.915204 kernel: audit: type=1101 audit(1734062736.908:1426): pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.908000 audit[4681]: USER_ACCT pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.914476 sshd[4681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:36.916525 sshd[4681]: Accepted publickey for core from 172.24.4.1 port 41256 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:36.911000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.934879 kernel: audit: type=1103 audit(1734062736.911:1427): pid=4681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.942108 kernel: audit: type=1006 audit(1734062736.911:1428): pid=4681 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 04:05:36.942253 kernel: audit: type=1300 audit(1734062736.911:1428): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce8a3520 a2=3 a3=0 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:36.911000 audit[4681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcce8a3520 a2=3 a3=0 items=0 ppid=1 pid=4681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:36.911000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:36.957259 kernel: audit: type=1327 audit(1734062736.911:1428): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:36.963824 systemd-logind[1136]: New session 13 of user core. Dec 13 04:05:36.965073 systemd[1]: Started session-13.scope. Dec 13 04:05:36.976000 audit[4681]: USER_START pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.990887 kernel: audit: type=1105 audit(1734062736.976:1429): pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:36.990000 audit[4684]: CRED_ACQ pid=4684 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.001812 kernel: audit: type=1103 audit(1734062736.990:1430): pid=4684 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.815125 sshd[4681]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:37.816000 audit[4681]: USER_END pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.820723 systemd[1]: sshd@12-172.24.4.161:22-172.24.4.1:41256.service: Deactivated successfully. Dec 13 04:05:37.822107 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 04:05:37.830847 kernel: audit: type=1106 audit(1734062737.816:1431): pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.831630 systemd-logind[1136]: Session 13 logged out. Waiting for processes to exit. Dec 13 04:05:37.816000 audit[4681]: CRED_DISP pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.843844 kernel: audit: type=1104 audit(1734062737.816:1432): pid=4681 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:37.843895 systemd-logind[1136]: Removed session 13. Dec 13 04:05:37.819000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.161:22-172.24.4.1:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:37.853839 kernel: audit: type=1131 audit(1734062737.819:1433): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.161:22-172.24.4.1:41256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:39.220000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:39.220000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00206d560 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:39.220000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:39.230000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:39.230000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00206d580 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:39.230000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:39.253000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:39.253000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0015f0f60 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:39.254000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:05:39.254000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00206d7c0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:05:39.254000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:39.253000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:05:39.830203 systemd[1]: run-containerd-runc-k8s.io-7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708-runc.UFb6KY.mount: Deactivated successfully. Dec 13 04:05:40.212537 systemd[1]: run-containerd-runc-k8s.io-7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708-runc.fmtOfw.mount: Deactivated successfully. Dec 13 04:05:42.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.161:22-172.24.4.1:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:42.827078 systemd[1]: Started sshd@13-172.24.4.161:22-172.24.4.1:41266.service. Dec 13 04:05:42.830268 kernel: kauditd_printk_skb: 12 callbacks suppressed Dec 13 04:05:42.830361 kernel: audit: type=1130 audit(1734062742.825:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.161:22-172.24.4.1:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:44.324840 sshd[4739]: Accepted publickey for core from 172.24.4.1 port 41266 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:44.322000 audit[4739]: USER_ACCT pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.335832 kernel: audit: type=1101 audit(1734062744.322:1439): pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.334000 audit[4739]: CRED_ACQ pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.337480 sshd[4739]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:44.347147 kernel: audit: type=1103 audit(1734062744.334:1440): pid=4739 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.354840 kernel: audit: type=1006 audit(1734062744.334:1441): pid=4739 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Dec 13 04:05:44.334000 audit[4739]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e47f350 a2=3 a3=0 items=0 ppid=1 pid=4739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:44.334000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:44.366833 kernel: audit: type=1300 audit(1734062744.334:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5e47f350 a2=3 a3=0 items=0 ppid=1 pid=4739 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:44.366930 kernel: audit: type=1327 audit(1734062744.334:1441): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:44.378913 systemd-logind[1136]: New session 14 of user core. Dec 13 04:05:44.379382 systemd[1]: Started session-14.scope. Dec 13 04:05:44.392000 audit[4739]: USER_START pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.406911 kernel: audit: type=1105 audit(1734062744.392:1442): pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.406000 audit[4741]: CRED_ACQ pid=4741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:44.417870 kernel: audit: type=1103 audit(1734062744.406:1443): pid=4741 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:45.068198 sshd[4739]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:45.068000 audit[4739]: USER_END pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:45.082821 kernel: audit: type=1106 audit(1734062745.068:1444): pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:45.084582 systemd-logind[1136]: Session 14 logged out. Waiting for processes to exit. Dec 13 04:05:45.085679 systemd[1]: sshd@13-172.24.4.161:22-172.24.4.1:41266.service: Deactivated successfully. Dec 13 04:05:45.088399 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 04:05:45.068000 audit[4739]: CRED_DISP pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:45.099955 kernel: audit: type=1104 audit(1734062745.068:1445): pid=4739 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:45.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.161:22-172.24.4.1:41266 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:45.100858 systemd-logind[1136]: Removed session 14. Dec 13 04:05:50.078586 systemd[1]: Started sshd@14-172.24.4.161:22-172.24.4.1:41040.service. Dec 13 04:05:50.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.161:22-172.24.4.1:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:50.085797 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:05:50.085935 kernel: audit: type=1130 audit(1734062750.077:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.161:22-172.24.4.1:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:51.423000 audit[4759]: USER_ACCT pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.426584 sshd[4759]: Accepted publickey for core from 172.24.4.1 port 41040 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:51.430798 kernel: audit: type=1101 audit(1734062751.423:1448): pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.430838 sshd[4759]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:51.428000 audit[4759]: CRED_ACQ pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.436805 kernel: audit: type=1103 audit(1734062751.428:1449): pid=4759 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.440832 kernel: audit: type=1006 audit(1734062751.428:1450): pid=4759 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 04:05:51.428000 audit[4759]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4892ca30 a2=3 a3=0 items=0 ppid=1 pid=4759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:51.446793 kernel: audit: type=1300 audit(1734062751.428:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4892ca30 a2=3 a3=0 items=0 ppid=1 pid=4759 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:51.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:51.449851 kernel: audit: type=1327 audit(1734062751.428:1450): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:51.451486 systemd-logind[1136]: New session 15 of user core. Dec 13 04:05:51.452877 systemd[1]: Started session-15.scope. Dec 13 04:05:51.457000 audit[4759]: USER_START pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.467809 kernel: audit: type=1105 audit(1734062751.457:1451): pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.467925 kernel: audit: type=1103 audit(1734062751.459:1452): pid=4761 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:51.459000 audit[4761]: CRED_ACQ pid=4761 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:52.262812 sshd[4759]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:52.263000 audit[4759]: USER_END pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:52.281854 kernel: audit: type=1106 audit(1734062752.263:1453): pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:52.280000 audit[4759]: CRED_DISP pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:52.285583 systemd-logind[1136]: Session 15 logged out. Waiting for processes to exit. Dec 13 04:05:52.289093 systemd[1]: sshd@14-172.24.4.161:22-172.24.4.1:41040.service: Deactivated successfully. Dec 13 04:05:52.290565 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 04:05:52.294161 systemd-logind[1136]: Removed session 15. Dec 13 04:05:52.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.161:22-172.24.4.1:41040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:52.295876 kernel: audit: type=1104 audit(1734062752.280:1454): pid=4759 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:57.276921 systemd[1]: Started sshd@15-172.24.4.161:22-172.24.4.1:55928.service. Dec 13 04:05:57.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.161:22-172.24.4.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:57.283358 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:05:57.283565 kernel: audit: type=1130 audit(1734062757.276:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.161:22-172.24.4.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:58.971000 audit[4782]: USER_ACCT pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:58.975822 sshd[4782]: Accepted publickey for core from 172.24.4.1 port 55928 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:05:58.986921 kernel: audit: type=1101 audit(1734062758.971:1457): pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:58.985000 audit[4782]: CRED_ACQ pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:58.989200 sshd[4782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:05:59.009872 kernel: audit: type=1103 audit(1734062758.985:1458): pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:58.985000 audit[4782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eb8f770 a2=3 a3=0 items=0 ppid=1 pid=4782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:59.032990 kernel: audit: type=1006 audit(1734062758.985:1459): pid=4782 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 04:05:59.033138 kernel: audit: type=1300 audit(1734062758.985:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4eb8f770 a2=3 a3=0 items=0 ppid=1 pid=4782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:05:59.034186 kernel: audit: type=1327 audit(1734062758.985:1459): proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:58.985000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:05:59.048692 systemd-logind[1136]: New session 16 of user core. Dec 13 04:05:59.050653 systemd[1]: Started session-16.scope. Dec 13 04:05:59.067000 audit[4782]: USER_START pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.084882 kernel: audit: type=1105 audit(1734062759.067:1460): pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.072000 audit[4784]: CRED_ACQ pid=4784 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.095829 kernel: audit: type=1103 audit(1734062759.072:1461): pid=4784 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.847178 sshd[4782]: pam_unix(sshd:session): session closed for user core Dec 13 04:05:59.847000 audit[4782]: USER_END pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.861875 kernel: audit: type=1106 audit(1734062759.847:1462): pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.875707 kernel: audit: type=1104 audit(1734062759.848:1463): pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.848000 audit[4782]: CRED_DISP pid=4782 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:05:59.862558 systemd[1]: sshd@15-172.24.4.161:22-172.24.4.1:55928.service: Deactivated successfully. Dec 13 04:05:59.864274 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 04:05:59.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.161:22-172.24.4.1:55928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:05:59.880495 systemd-logind[1136]: Session 16 logged out. Waiting for processes to exit. Dec 13 04:05:59.883857 systemd-logind[1136]: Removed session 16. Dec 13 04:06:04.858417 systemd[1]: Started sshd@16-172.24.4.161:22-172.24.4.1:38872.service. Dec 13 04:06:04.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.161:22-172.24.4.1:38872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:04.863630 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:06:04.865382 kernel: audit: type=1130 audit(1734062764.858:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.161:22-172.24.4.1:38872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:06.251000 audit[4819]: USER_ACCT pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.254379 sshd[4819]: Accepted publickey for core from 172.24.4.1 port 38872 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:06.265942 kernel: audit: type=1101 audit(1734062766.251:1466): pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.269000 audit[4819]: CRED_ACQ pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.282838 kernel: audit: type=1103 audit(1734062766.269:1467): pid=4819 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.269000 audit[4819]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36e6e320 a2=3 a3=0 items=0 ppid=1 pid=4819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:06.291080 sshd[4819]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:06.302894 kernel: audit: type=1006 audit(1734062766.269:1468): pid=4819 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 04:06:06.303041 kernel: audit: type=1300 audit(1734062766.269:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36e6e320 a2=3 a3=0 items=0 ppid=1 pid=4819 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:06.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:06.308928 kernel: audit: type=1327 audit(1734062766.269:1468): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:06.319243 systemd-logind[1136]: New session 17 of user core. Dec 13 04:06:06.322980 systemd[1]: Started session-17.scope. Dec 13 04:06:06.336000 audit[4819]: USER_START pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.352929 kernel: audit: type=1105 audit(1734062766.336:1469): pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.353136 kernel: audit: type=1103 audit(1734062766.350:1470): pid=4821 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:06.350000 audit[4821]: CRED_ACQ pid=4821 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:07.482286 sshd[4819]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:07.484000 audit[4819]: USER_END pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:07.500824 kernel: audit: type=1106 audit(1734062767.484:1471): pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:07.500972 kernel: audit: type=1104 audit(1734062767.494:1472): pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:07.494000 audit[4819]: CRED_DISP pid=4819 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:07.498133 systemd[1]: sshd@16-172.24.4.161:22-172.24.4.1:38872.service: Deactivated successfully. Dec 13 04:06:07.499788 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 04:06:07.496000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.161:22-172.24.4.1:38872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:07.507477 systemd-logind[1136]: Session 17 logged out. Waiting for processes to exit. Dec 13 04:06:07.509098 systemd-logind[1136]: Removed session 17. Dec 13 04:06:12.479449 systemd[1]: Started sshd@17-172.24.4.161:22-172.24.4.1:38878.service. Dec 13 04:06:12.486265 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:06:12.486350 kernel: audit: type=1130 audit(1734062772.478:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.161:22-172.24.4.1:38878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:12.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.161:22-172.24.4.1:38878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:13.948148 sshd[4853]: Accepted publickey for core from 172.24.4.1 port 38878 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:13.960032 kernel: audit: type=1101 audit(1734062773.946:1475): pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:13.946000 audit[4853]: USER_ACCT pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:13.951160 sshd[4853]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:13.947000 audit[4853]: CRED_ACQ pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:13.972090 kernel: audit: type=1103 audit(1734062773.947:1476): pid=4853 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:13.972615 systemd[1]: Started session-18.scope. Dec 13 04:06:13.976258 systemd-logind[1136]: New session 18 of user core. Dec 13 04:06:13.979991 kernel: audit: type=1006 audit(1734062773.947:1477): pid=4853 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 04:06:13.947000 audit[4853]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfebdbae0 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:13.993129 kernel: audit: type=1300 audit(1734062773.947:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfebdbae0 a2=3 a3=0 items=0 ppid=1 pid=4853 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:13.947000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:13.999527 kernel: audit: type=1327 audit(1734062773.947:1477): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:13.996000 audit[4853]: USER_START pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:13.998000 audit[4855]: CRED_ACQ pid=4855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.023952 kernel: audit: type=1105 audit(1734062773.996:1478): pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.024392 kernel: audit: type=1103 audit(1734062773.998:1479): pid=4855 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.710176 sshd[4853]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:14.710000 audit[4853]: USER_END pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.717930 systemd[1]: sshd@17-172.24.4.161:22-172.24.4.1:38878.service: Deactivated successfully. Dec 13 04:06:14.719540 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 04:06:14.735182 kernel: audit: type=1106 audit(1734062774.710:1480): pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.735330 kernel: audit: type=1104 audit(1734062774.710:1481): pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.710000 audit[4853]: CRED_DISP pid=4853 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:14.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.161:22-172.24.4.1:38878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:14.736152 systemd-logind[1136]: Session 18 logged out. Waiting for processes to exit. Dec 13 04:06:14.739394 systemd[1]: Started sshd@18-172.24.4.161:22-172.24.4.1:38314.service. Dec 13 04:06:14.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.161:22-172.24.4.1:38314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:14.742759 systemd-logind[1136]: Removed session 18. Dec 13 04:06:16.195000 audit[4865]: USER_ACCT pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:16.197819 sshd[4865]: Accepted publickey for core from 172.24.4.1 port 38314 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:16.198000 audit[4865]: CRED_ACQ pid=4865 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:16.198000 audit[4865]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd10924110 a2=3 a3=0 items=0 ppid=1 pid=4865 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:16.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:16.200824 sshd[4865]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:16.212298 systemd-logind[1136]: New session 19 of user core. Dec 13 04:06:16.213363 systemd[1]: Started session-19.scope. Dec 13 04:06:16.226000 audit[4865]: USER_START pid=4865 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:16.229000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:17.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.161:22-172.24.4.1:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:17.564697 systemd[1]: Started sshd@19-172.24.4.161:22-172.24.4.1:38316.service. Dec 13 04:06:17.565089 sshd[4865]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:17.570506 kernel: kauditd_printk_skb: 9 callbacks suppressed Dec 13 04:06:17.573721 kernel: audit: type=1130 audit(1734062777.565:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.161:22-172.24.4.1:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:17.586000 audit[4865]: USER_END pid=4865 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:17.603304 kernel: audit: type=1106 audit(1734062777.586:1490): pid=4865 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:17.609196 systemd-logind[1136]: Session 19 logged out. Waiting for processes to exit. Dec 13 04:06:17.610014 systemd[1]: sshd@18-172.24.4.161:22-172.24.4.1:38314.service: Deactivated successfully. Dec 13 04:06:17.612374 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 04:06:17.603000 audit[4865]: CRED_DISP pid=4865 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:17.625841 kernel: audit: type=1104 audit(1734062777.603:1491): pid=4865 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:17.626253 systemd-logind[1136]: Removed session 19. Dec 13 04:06:17.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.161:22-172.24.4.1:38314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:17.635884 kernel: audit: type=1131 audit(1734062777.608:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.161:22-172.24.4.1:38314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:18.947000 audit[4874]: USER_ACCT pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:18.951541 sshd[4874]: Accepted publickey for core from 172.24.4.1 port 38316 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:18.961903 kernel: audit: type=1101 audit(1734062778.947:1493): pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:18.960000 audit[4874]: CRED_ACQ pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:18.973438 sshd[4874]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:18.979759 kernel: audit: type=1103 audit(1734062778.960:1494): pid=4874 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:18.979930 kernel: audit: type=1006 audit(1734062778.960:1495): pid=4874 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 04:06:18.960000 audit[4874]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd89823af0 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:18.991936 kernel: audit: type=1300 audit(1734062778.960:1495): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd89823af0 a2=3 a3=0 items=0 ppid=1 pid=4874 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:18.960000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:18.996885 kernel: audit: type=1327 audit(1734062778.960:1495): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:19.005869 systemd[1]: Started session-20.scope. Dec 13 04:06:19.007049 systemd-logind[1136]: New session 20 of user core. Dec 13 04:06:19.021000 audit[4874]: USER_START pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:19.037858 kernel: audit: type=1105 audit(1734062779.021:1496): pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:19.035000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:22.258000 audit[4888]: NETFILTER_CFG table=filter:119 family=2 entries=20 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:22.258000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffe9339c150 a2=0 a3=7ffe9339c13c items=0 ppid=2020 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:22.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:22.261000 audit[4888]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=4888 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:22.261000 audit[4888]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffe9339c150 a2=0 a3=0 items=0 ppid=2020 pid=4888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:22.261000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:22.279000 audit[4890]: NETFILTER_CFG table=filter:121 family=2 entries=32 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:22.279000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fff50cc19e0 a2=0 a3=7fff50cc19cc items=0 ppid=2020 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:22.279000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:22.284000 audit[4890]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4890 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:22.284000 audit[4890]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff50cc19e0 a2=0 a3=0 items=0 ppid=2020 pid=4890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:22.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:22.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.161:22-172.24.4.1:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:22.456238 systemd[1]: Started sshd@20-172.24.4.161:22-172.24.4.1:38320.service. Dec 13 04:06:22.459971 sshd[4874]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:22.467000 audit[4874]: USER_END pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:22.467000 audit[4874]: CRED_DISP pid=4874 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:22.489378 systemd[1]: sshd@19-172.24.4.161:22-172.24.4.1:38316.service: Deactivated successfully. Dec 13 04:06:22.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.161:22-172.24.4.1:38316 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:22.491112 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 04:06:22.491384 systemd[1]: session-20.scope: Consumed 1.018s CPU time. Dec 13 04:06:22.493511 systemd-logind[1136]: Session 20 logged out. Waiting for processes to exit. Dec 13 04:06:22.496345 systemd-logind[1136]: Removed session 20. Dec 13 04:06:23.839369 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 04:06:23.839681 kernel: audit: type=1101 audit(1734062783.822:1506): pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.822000 audit[4892]: USER_ACCT pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.840038 sshd[4892]: Accepted publickey for core from 172.24.4.1 port 38320 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:23.838000 audit[4892]: CRED_ACQ pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.843826 sshd[4892]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:23.852889 kernel: audit: type=1103 audit(1734062783.838:1507): pid=4892 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.838000 audit[4892]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46495e90 a2=3 a3=0 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:23.874458 kernel: audit: type=1006 audit(1734062783.838:1508): pid=4892 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 04:06:23.874997 kernel: audit: type=1300 audit(1734062783.838:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe46495e90 a2=3 a3=0 items=0 ppid=1 pid=4892 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:23.838000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:23.880832 kernel: audit: type=1327 audit(1734062783.838:1508): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:23.892135 systemd-logind[1136]: New session 21 of user core. Dec 13 04:06:23.892834 systemd[1]: Started session-21.scope. Dec 13 04:06:23.906000 audit[4892]: USER_START pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.924217 kernel: audit: type=1105 audit(1734062783.906:1509): pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.924428 kernel: audit: type=1103 audit(1734062783.921:1510): pid=4895 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:23.921000 audit[4895]: CRED_ACQ pid=4895 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:26.008047 sshd[4892]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:26.009000 audit[4892]: USER_END pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:26.017142 systemd[1]: sshd@20-172.24.4.161:22-172.24.4.1:38320.service: Deactivated successfully. Dec 13 04:06:26.018628 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 04:06:26.009000 audit[4892]: CRED_DISP pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:26.032611 systemd-logind[1136]: Session 21 logged out. Waiting for processes to exit. Dec 13 04:06:26.039499 systemd[1]: Started sshd@21-172.24.4.161:22-172.24.4.1:60054.service. Dec 13 04:06:26.042168 kernel: audit: type=1106 audit(1734062786.009:1511): pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:26.042339 kernel: audit: type=1104 audit(1734062786.009:1512): pid=4892 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:26.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.161:22-172.24.4.1:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:26.045488 systemd-logind[1136]: Removed session 21. Dec 13 04:06:26.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.161:22-172.24.4.1:60054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:26.053892 kernel: audit: type=1131 audit(1734062786.015:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.161:22-172.24.4.1:38320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:27.253861 sshd[4902]: Accepted publickey for core from 172.24.4.1 port 60054 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:27.252000 audit[4902]: USER_ACCT pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:27.255000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:27.255000 audit[4902]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe67995f70 a2=3 a3=0 items=0 ppid=1 pid=4902 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:27.255000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:27.258048 sshd[4902]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:27.269821 systemd-logind[1136]: New session 22 of user core. Dec 13 04:06:27.270094 systemd[1]: Started session-22.scope. Dec 13 04:06:27.284000 audit[4902]: USER_START pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:27.287000 audit[4904]: CRED_ACQ pid=4904 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:28.463893 sshd[4902]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:28.465000 audit[4902]: USER_END pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:28.466000 audit[4902]: CRED_DISP pid=4902 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:28.469884 systemd-logind[1136]: Session 22 logged out. Waiting for processes to exit. Dec 13 04:06:28.469917 systemd[1]: sshd@21-172.24.4.161:22-172.24.4.1:60054.service: Deactivated successfully. Dec 13 04:06:28.470856 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 04:06:28.469000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.161:22-172.24.4.1:60054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:28.473497 systemd-logind[1136]: Removed session 22. Dec 13 04:06:30.242000 audit[4914]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:30.246534 kernel: kauditd_printk_skb: 11 callbacks suppressed Dec 13 04:06:30.246675 kernel: audit: type=1325 audit(1734062790.242:1523): table=filter:123 family=2 entries=20 op=nft_register_rule pid=4914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:30.242000 audit[4914]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffed133d390 a2=0 a3=7ffed133d37c items=0 ppid=2020 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:30.267859 kernel: audit: type=1300 audit(1734062790.242:1523): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffed133d390 a2=0 a3=7ffed133d37c items=0 ppid=2020 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:30.268117 kernel: audit: type=1327 audit(1734062790.242:1523): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:30.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:30.259000 audit[4914]: NETFILTER_CFG table=nat:124 family=2 entries=106 op=nft_register_chain pid=4914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:30.281174 kernel: audit: type=1325 audit(1734062790.259:1524): table=nat:124 family=2 entries=106 op=nft_register_chain pid=4914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 04:06:30.281305 kernel: audit: type=1300 audit(1734062790.259:1524): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed133d390 a2=0 a3=7ffed133d37c items=0 ppid=2020 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:30.259000 audit[4914]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed133d390 a2=0 a3=7ffed133d37c items=0 ppid=2020 pid=4914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:30.259000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:30.295610 kernel: audit: type=1327 audit(1734062790.259:1524): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 04:06:31.673000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.674000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.696361 kernel: audit: type=1400 audit(1734062791.673:1525): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.696512 kernel: audit: type=1400 audit(1734062791.674:1526): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.674000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ced700 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:31.710398 kernel: audit: type=1300 audit(1734062791.674:1526): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ced700 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:31.674000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:31.722333 kernel: audit: type=1327 audit(1734062791.674:1526): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:31.673000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d80540 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:31.673000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:31.858000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524549 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.858000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c015112120 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.858000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:31.860000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.860000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524555 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.860000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c015110320 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:31.860000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c015098600 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.860000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:31.861000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.861000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c015098630 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.861000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:31.919000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524553 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.919000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0150986c0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:31.919000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:31.919000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0151104a0 a2=fc6 a3=0 items=0 ppid=1651 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c413,c701 key=(null) Dec 13 04:06:31.919000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E313631002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 04:06:32.462000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.4230341027/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c27,c599 tclass=file permissive=0 Dec 13 04:06:32.462000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0022fd840 a2=fc6 a3=0 items=0 ppid=3410 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c599 key=(null) Dec 13 04:06:32.462000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:06:33.355308 systemd[1]: run-containerd-runc-k8s.io-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1-runc.amwiWW.mount: Deactivated successfully. Dec 13 04:06:33.477021 systemd[1]: Started sshd@22-172.24.4.161:22-172.24.4.1:60068.service. Dec 13 04:06:33.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.161:22-172.24.4.1:60068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:34.518679 sshd[4937]: Accepted publickey for core from 172.24.4.1 port 60068 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:34.517000 audit[4937]: USER_ACCT pid=4937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:34.520000 audit[4937]: CRED_ACQ pid=4937 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:34.520000 audit[4937]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd55a8200 a2=3 a3=0 items=0 ppid=1 pid=4937 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:34.520000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:34.524456 sshd[4937]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:34.537059 systemd-logind[1136]: New session 23 of user core. Dec 13 04:06:34.537714 systemd[1]: Started session-23.scope. Dec 13 04:06:34.550000 audit[4937]: USER_START pid=4937 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:34.554000 audit[4939]: CRED_ACQ pid=4939 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:35.506000 audit[4092]: AVC avc: denied { watch } for pid=4092 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.3903584844/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c579 tclass=file permissive=0 Dec 13 04:06:35.508906 kernel: kauditd_printk_skb: 31 callbacks suppressed Dec 13 04:06:35.517623 kernel: audit: type=1400 audit(1734062795.506:1540): avc: denied { watch } for pid=4092 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_04_04_09.3903584844/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c10,c579 tclass=file permissive=0 Dec 13 04:06:35.517709 kernel: audit: type=1300 audit(1734062795.506:1540): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b1e180 a2=fc6 a3=0 items=0 ppid=3550 pid=4092 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 key=(null) Dec 13 04:06:35.506000 audit[4092]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b1e180 a2=fc6 a3=0 items=0 ppid=3550 pid=4092 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c10,c579 key=(null) Dec 13 04:06:35.506000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:06:35.525074 kernel: audit: type=1327 audit(1734062795.506:1540): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 04:06:35.574950 sshd[4937]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:35.576000 audit[4937]: USER_END pid=4937 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:35.592827 kernel: audit: type=1106 audit(1734062795.576:1541): pid=4937 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:35.592980 systemd[1]: sshd@22-172.24.4.161:22-172.24.4.1:60068.service: Deactivated successfully. Dec 13 04:06:35.576000 audit[4937]: CRED_DISP pid=4937 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:35.629427 kernel: audit: type=1104 audit(1734062795.576:1542): pid=4937 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:35.629533 kernel: audit: type=1131 audit(1734062795.592:1543): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.161:22-172.24.4.1:60068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:35.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.161:22-172.24.4.1:60068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:35.594337 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 04:06:35.604957 systemd-logind[1136]: Session 23 logged out. Waiting for processes to exit. Dec 13 04:06:35.614880 systemd-logind[1136]: Removed session 23. Dec 13 04:06:39.232000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.245893 kernel: audit: type=1400 audit(1734062799.232:1544): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.232000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002855b40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:39.260816 kernel: audit: type=1300 audit(1734062799.232:1544): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002855b40 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:39.261001 kernel: audit: type=1327 audit(1734062799.232:1544): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:39.232000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:39.232000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.282063 kernel: audit: type=1400 audit(1734062799.232:1545): avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.232000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002855b60 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:39.232000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:39.256000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.256000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cedce0 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:39.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:39.256000 audit[1766]: AVC avc: denied { watch } for pid=1766 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524547 scontext=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 04:06:39.256000 audit[1766]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cedd00 a2=fc6 a3=0 items=0 ppid=1622 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c120,c723 key=(null) Dec 13 04:06:39.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 04:06:40.215244 systemd[1]: run-containerd-runc-k8s.io-7557f8f40bc6c81f226f6b07189f09694c076d395ad3a2a65fd730e45bb01708-runc.C2leVD.mount: Deactivated successfully. Dec 13 04:06:40.589231 systemd[1]: Started sshd@23-172.24.4.161:22-172.24.4.1:41076.service. Dec 13 04:06:40.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.161:22-172.24.4.1:41076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:40.593369 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 04:06:40.593521 kernel: audit: type=1130 audit(1734062800.589:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.161:22-172.24.4.1:41076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:42.034000 audit[4989]: USER_ACCT pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.035347 sshd[4989]: Accepted publickey for core from 172.24.4.1 port 41076 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:42.045821 kernel: audit: type=1101 audit(1734062802.034:1549): pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.049159 sshd[4989]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:42.047000 audit[4989]: CRED_ACQ pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.059842 kernel: audit: type=1103 audit(1734062802.047:1550): pid=4989 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.067833 kernel: audit: type=1006 audit(1734062802.047:1551): pid=4989 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 04:06:42.047000 audit[4989]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb596c790 a2=3 a3=0 items=0 ppid=1 pid=4989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:42.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:42.084636 kernel: audit: type=1300 audit(1734062802.047:1551): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb596c790 a2=3 a3=0 items=0 ppid=1 pid=4989 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:42.084841 kernel: audit: type=1327 audit(1734062802.047:1551): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:42.088827 systemd-logind[1136]: New session 24 of user core. Dec 13 04:06:42.092004 systemd[1]: Started session-24.scope. Dec 13 04:06:42.104000 audit[4989]: USER_START pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.116000 audit[4993]: CRED_ACQ pid=4993 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.122321 kernel: audit: type=1105 audit(1734062802.104:1552): pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.122482 kernel: audit: type=1103 audit(1734062802.116:1553): pid=4993 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.911171 sshd[4989]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:42.912000 audit[4989]: USER_END pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.926831 kernel: audit: type=1106 audit(1734062802.912:1554): pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.927030 systemd[1]: sshd@23-172.24.4.161:22-172.24.4.1:41076.service: Deactivated successfully. Dec 13 04:06:42.912000 audit[4989]: CRED_DISP pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.928742 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 04:06:42.936855 kernel: audit: type=1104 audit(1734062802.912:1555): pid=4989 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:42.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.161:22-172.24.4.1:41076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:42.937851 systemd-logind[1136]: Session 24 logged out. Waiting for processes to exit. Dec 13 04:06:42.939629 systemd-logind[1136]: Removed session 24. Dec 13 04:06:47.937381 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:06:47.937592 kernel: audit: type=1130 audit(1734062807.923:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.161:22-172.24.4.1:50150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:47.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.161:22-172.24.4.1:50150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:47.924370 systemd[1]: Started sshd@24-172.24.4.161:22-172.24.4.1:50150.service. Dec 13 04:06:49.439000 audit[5003]: USER_ACCT pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.454686 sshd[5003]: Accepted publickey for core from 172.24.4.1 port 50150 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:49.455618 kernel: audit: type=1101 audit(1734062809.439:1558): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.456224 sshd[5003]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:49.453000 audit[5003]: CRED_ACQ pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.469193 kernel: audit: type=1103 audit(1734062809.453:1559): pid=5003 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.469371 kernel: audit: type=1006 audit(1734062809.454:1560): pid=5003 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 04:06:49.454000 audit[5003]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3c857f70 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:49.495081 kernel: audit: type=1300 audit(1734062809.454:1560): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3c857f70 a2=3 a3=0 items=0 ppid=1 pid=5003 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:49.495257 kernel: audit: type=1327 audit(1734062809.454:1560): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:49.454000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:49.502000 systemd-logind[1136]: New session 25 of user core. Dec 13 04:06:49.502983 systemd[1]: Started session-25.scope. Dec 13 04:06:49.521000 audit[5003]: USER_START pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.528832 kernel: audit: type=1105 audit(1734062809.521:1561): pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.528000 audit[5005]: CRED_ACQ pid=5005 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:49.534808 kernel: audit: type=1103 audit(1734062809.528:1562): pid=5005 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:50.223528 sshd[5003]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:50.226000 audit[5003]: USER_END pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:50.240830 kernel: audit: type=1106 audit(1734062810.226:1563): pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:50.241036 systemd[1]: sshd@24-172.24.4.161:22-172.24.4.1:50150.service: Deactivated successfully. Dec 13 04:06:50.242681 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 04:06:50.245606 systemd-logind[1136]: Session 25 logged out. Waiting for processes to exit. Dec 13 04:06:50.226000 audit[5003]: CRED_DISP pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:50.249258 systemd-logind[1136]: Removed session 25. Dec 13 04:06:50.260973 kernel: audit: type=1104 audit(1734062810.226:1564): pid=5003 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:50.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.161:22-172.24.4.1:50150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:55.235199 systemd[1]: Started sshd@25-172.24.4.161:22-172.24.4.1:55406.service. Dec 13 04:06:55.239905 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:06:55.239981 kernel: audit: type=1130 audit(1734062815.235:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.161:22-172.24.4.1:55406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:55.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.161:22-172.24.4.1:55406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:57.032000 audit[5015]: USER_ACCT pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.035553 sshd[5015]: Accepted publickey for core from 172.24.4.1 port 55406 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:06:57.039846 kernel: audit: type=1101 audit(1734062817.032:1567): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.039000 audit[5015]: CRED_ACQ pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.040377 sshd[5015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:06:57.057206 kernel: audit: type=1103 audit(1734062817.039:1568): pid=5015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.057289 kernel: audit: type=1006 audit(1734062817.039:1569): pid=5015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 04:06:57.039000 audit[5015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa7cf4c0 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:57.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:57.065095 kernel: audit: type=1300 audit(1734062817.039:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfa7cf4c0 a2=3 a3=0 items=0 ppid=1 pid=5015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:06:57.065172 kernel: audit: type=1327 audit(1734062817.039:1569): proctitle=737368643A20636F7265205B707269765D Dec 13 04:06:57.069687 systemd-logind[1136]: New session 26 of user core. Dec 13 04:06:57.072424 systemd[1]: Started session-26.scope. Dec 13 04:06:57.087846 kernel: audit: type=1105 audit(1734062817.080:1570): pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.080000 audit[5015]: USER_START pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.081000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.093903 kernel: audit: type=1103 audit(1734062817.081:1571): pid=5017 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.750058 sshd[5015]: pam_unix(sshd:session): session closed for user core Dec 13 04:06:57.750000 audit[5015]: USER_END pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.752000 audit[5015]: CRED_DISP pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.758604 systemd[1]: sshd@25-172.24.4.161:22-172.24.4.1:55406.service: Deactivated successfully. Dec 13 04:06:57.759672 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 04:06:57.763045 kernel: audit: type=1106 audit(1734062817.750:1572): pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.763127 kernel: audit: type=1104 audit(1734062817.752:1573): pid=5015 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:06:57.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.161:22-172.24.4.1:55406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:06:57.764194 systemd-logind[1136]: Session 26 logged out. Waiting for processes to exit. Dec 13 04:06:57.765492 systemd-logind[1136]: Removed session 26. Dec 13 04:07:02.772321 systemd[1]: Started sshd@26-172.24.4.161:22-172.24.4.1:55420.service. Dec 13 04:07:02.785251 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 04:07:02.785396 kernel: audit: type=1130 audit(1734062822.771:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.161:22-172.24.4.1:55420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:07:02.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.161:22-172.24.4.1:55420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:07:03.354068 systemd[1]: run-containerd-runc-k8s.io-3004b5ffe0894677a257ad0df163aa20524c7eaf37210060ef817202ca32e7c1-runc.zgJCl5.mount: Deactivated successfully. Dec 13 04:07:04.073000 audit[5027]: USER_ACCT pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.075357 sshd[5027]: Accepted publickey for core from 172.24.4.1 port 55420 ssh2: RSA SHA256:OkcE/e8cyiYfDhFAjIOhJbymiCk6iRYfYgj/ZDa0TCk Dec 13 04:07:04.085000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.087925 sshd[5027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 04:07:04.096476 kernel: audit: type=1101 audit(1734062824.073:1576): pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.096703 kernel: audit: type=1103 audit(1734062824.085:1577): pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.103836 kernel: audit: type=1006 audit(1734062824.085:1578): pid=5027 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 04:07:04.104071 kernel: audit: type=1300 audit(1734062824.085:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ff9b910 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:07:04.085000 audit[5027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0ff9b910 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 04:07:04.085000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 04:07:04.119918 kernel: audit: type=1327 audit(1734062824.085:1578): proctitle=737368643A20636F7265205B707269765D Dec 13 04:07:04.129855 systemd-logind[1136]: New session 27 of user core. Dec 13 04:07:04.130896 systemd[1]: Started session-27.scope. Dec 13 04:07:04.144000 audit[5027]: USER_START pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.158878 kernel: audit: type=1105 audit(1734062824.144:1579): pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.163000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:04.168851 kernel: audit: type=1103 audit(1734062824.163:1580): pid=5051 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:05.703140 sshd[5027]: pam_unix(sshd:session): session closed for user core Dec 13 04:07:05.705000 audit[5027]: USER_END pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:05.706000 audit[5027]: CRED_DISP pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:05.719130 systemd[1]: sshd@26-172.24.4.161:22-172.24.4.1:55420.service: Deactivated successfully. Dec 13 04:07:05.721725 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 04:07:05.728426 kernel: audit: type=1106 audit(1734062825.705:1581): pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:05.728600 kernel: audit: type=1104 audit(1734062825.706:1582): pid=5027 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 04:07:05.729866 systemd-logind[1136]: Session 27 logged out. Waiting for processes to exit. Dec 13 04:07:05.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.161:22-172.24.4.1:55420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 04:07:05.733195 systemd-logind[1136]: Removed session 27.