Dec 13 14:30:58.999889 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:30:58.999925 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:58.999947 kernel: BIOS-provided physical RAM map: Dec 13 14:30:58.999960 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Dec 13 14:30:58.999973 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Dec 13 14:30:58.999985 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Dec 13 14:30:59.000000 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdcfff] usable Dec 13 14:30:59.000013 kernel: BIOS-e820: [mem 0x000000007ffdd000-0x000000007fffffff] reserved Dec 13 14:30:59.000028 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Dec 13 14:30:59.000040 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Dec 13 14:30:59.000053 kernel: NX (Execute Disable) protection: active Dec 13 14:30:59.000065 kernel: SMBIOS 2.8 present. Dec 13 14:30:59.000077 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.15.0-1 04/01/2014 Dec 13 14:30:59.000090 kernel: Hypervisor detected: KVM Dec 13 14:30:59.000104 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Dec 13 14:30:59.000121 kernel: kvm-clock: cpu 0, msr 2519a001, primary cpu clock Dec 13 14:30:59.000134 kernel: kvm-clock: using sched offset of 5014726907 cycles Dec 13 14:30:59.000148 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Dec 13 14:30:59.000162 kernel: tsc: Detected 1996.249 MHz processor Dec 13 14:30:59.000176 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:30:59.000190 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:30:59.000204 kernel: last_pfn = 0x7ffdd max_arch_pfn = 0x400000000 Dec 13 14:30:59.000218 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:30:59.000236 kernel: ACPI: Early table checksum verification disabled Dec 13 14:30:59.000250 kernel: ACPI: RSDP 0x00000000000F5930 000014 (v00 BOCHS ) Dec 13 14:30:59.000264 kernel: ACPI: RSDT 0x000000007FFE1848 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:59.000277 kernel: ACPI: FACP 0x000000007FFE172C 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:59.000351 kernel: ACPI: DSDT 0x000000007FFE0040 0016EC (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:59.000364 kernel: ACPI: FACS 0x000000007FFE0000 000040 Dec 13 14:30:59.000378 kernel: ACPI: APIC 0x000000007FFE17A0 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:59.000391 kernel: ACPI: WAET 0x000000007FFE1820 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Dec 13 14:30:59.000405 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe172c-0x7ffe179f] Dec 13 14:30:59.000423 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe172b] Dec 13 14:30:59.000436 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Dec 13 14:30:59.000450 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17a0-0x7ffe181f] Dec 13 14:30:59.000463 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe1820-0x7ffe1847] Dec 13 14:30:59.000476 kernel: No NUMA configuration found Dec 13 14:30:59.000489 kernel: Faking a node at [mem 0x0000000000000000-0x000000007ffdcfff] Dec 13 14:30:59.000503 kernel: NODE_DATA(0) allocated [mem 0x7ffd7000-0x7ffdcfff] Dec 13 14:30:59.000517 kernel: Zone ranges: Dec 13 14:30:59.000537 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:30:59.000551 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdcfff] Dec 13 14:30:59.000565 kernel: Normal empty Dec 13 14:30:59.000579 kernel: Movable zone start for each node Dec 13 14:30:59.000593 kernel: Early memory node ranges Dec 13 14:30:59.000608 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Dec 13 14:30:59.000625 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdcfff] Dec 13 14:30:59.000639 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdcfff] Dec 13 14:30:59.000653 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:30:59.000667 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Dec 13 14:30:59.000681 kernel: On node 0, zone DMA32: 35 pages in unavailable ranges Dec 13 14:30:59.000695 kernel: ACPI: PM-Timer IO Port: 0x608 Dec 13 14:30:59.000709 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Dec 13 14:30:59.000723 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:30:59.000737 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Dec 13 14:30:59.000756 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Dec 13 14:30:59.000770 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 14:30:59.000784 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Dec 13 14:30:59.000799 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Dec 13 14:30:59.000813 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:30:59.000827 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 14:30:59.000841 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Dec 13 14:30:59.000855 kernel: Booting paravirtualized kernel on KVM Dec 13 14:30:59.000869 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:30:59.000884 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 14:30:59.000902 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 14:30:59.000917 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 14:30:59.000930 kernel: pcpu-alloc: [0] 0 1 Dec 13 14:30:59.000944 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Dec 13 14:30:59.000958 kernel: kvm-guest: PV spinlocks disabled, no host support Dec 13 14:30:59.000972 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515805 Dec 13 14:30:59.000986 kernel: Policy zone: DMA32 Dec 13 14:30:59.001003 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:59.001021 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:30:59.001035 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:30:59.001049 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:30:59.001064 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:30:59.001079 kernel: Memory: 1973284K/2096620K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 123076K reserved, 0K cma-reserved) Dec 13 14:30:59.001093 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:30:59.001107 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:30:59.001121 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:30:59.001138 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:30:59.001154 kernel: rcu: RCU event tracing is enabled. Dec 13 14:30:59.001169 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:30:59.001183 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:30:59.001198 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:30:59.001212 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:30:59.001226 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:30:59.001240 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Dec 13 14:30:59.001254 kernel: Console: colour VGA+ 80x25 Dec 13 14:30:59.001272 kernel: printk: console [tty0] enabled Dec 13 14:30:59.001326 kernel: printk: console [ttyS0] enabled Dec 13 14:30:59.001341 kernel: ACPI: Core revision 20210730 Dec 13 14:30:59.001355 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:30:59.001369 kernel: x2apic enabled Dec 13 14:30:59.001383 kernel: Switched APIC routing to physical x2apic. Dec 13 14:30:59.001397 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:30:59.001411 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Dec 13 14:30:59.001425 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) Dec 13 14:30:59.001440 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Dec 13 14:30:59.001458 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Dec 13 14:30:59.001473 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:30:59.001487 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 14:30:59.001501 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:30:59.001516 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 14:30:59.001530 kernel: Speculative Store Bypass: Vulnerable Dec 13 14:30:59.001544 kernel: x86/fpu: x87 FPU will use FXSAVE Dec 13 14:30:59.001558 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:30:59.001571 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:30:59.001589 kernel: LSM: Security Framework initializing Dec 13 14:30:59.001602 kernel: SELinux: Initializing. Dec 13 14:30:59.001617 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:30:59.001631 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:30:59.001645 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) Dec 13 14:30:59.001659 kernel: Performance Events: AMD PMU driver. Dec 13 14:30:59.001673 kernel: ... version: 0 Dec 13 14:30:59.001687 kernel: ... bit width: 48 Dec 13 14:30:59.001701 kernel: ... generic registers: 4 Dec 13 14:30:59.001729 kernel: ... value mask: 0000ffffffffffff Dec 13 14:30:59.001744 kernel: ... max period: 00007fffffffffff Dec 13 14:30:59.001761 kernel: ... fixed-purpose events: 0 Dec 13 14:30:59.001776 kernel: ... event mask: 000000000000000f Dec 13 14:30:59.001791 kernel: signal: max sigframe size: 1440 Dec 13 14:30:59.001805 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:30:59.001820 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:30:59.001835 kernel: x86: Booting SMP configuration: Dec 13 14:30:59.001853 kernel: .... node #0, CPUs: #1 Dec 13 14:30:59.001868 kernel: kvm-clock: cpu 1, msr 2519a041, secondary cpu clock Dec 13 14:30:59.001883 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Dec 13 14:30:59.001897 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:30:59.001912 kernel: smpboot: Max logical packages: 2 Dec 13 14:30:59.001926 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) Dec 13 14:30:59.001941 kernel: devtmpfs: initialized Dec 13 14:30:59.001956 kernel: x86/mm: Memory block size: 128MB Dec 13 14:30:59.001971 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:30:59.001989 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:30:59.002005 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:30:59.002019 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:30:59.002034 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:30:59.002049 kernel: audit: type=2000 audit(1734100258.265:1): state=initialized audit_enabled=0 res=1 Dec 13 14:30:59.002064 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:30:59.002078 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:30:59.002093 kernel: cpuidle: using governor menu Dec 13 14:30:59.002108 kernel: ACPI: bus type PCI registered Dec 13 14:30:59.002125 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:30:59.002140 kernel: dca service started, version 1.12.1 Dec 13 14:30:59.002155 kernel: PCI: Using configuration type 1 for base access Dec 13 14:30:59.002170 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:30:59.002185 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:30:59.002200 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:30:59.002214 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:30:59.002229 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:30:59.002244 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:30:59.002262 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:30:59.002276 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:30:59.002318 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:30:59.002333 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:30:59.002349 kernel: ACPI: Interpreter enabled Dec 13 14:30:59.002363 kernel: ACPI: PM: (supports S0 S3 S5) Dec 13 14:30:59.002378 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:30:59.002393 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:30:59.002408 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Dec 13 14:30:59.002427 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Dec 13 14:30:59.002650 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:30:59.002825 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Dec 13 14:30:59.002851 kernel: acpiphp: Slot [3] registered Dec 13 14:30:59.002866 kernel: acpiphp: Slot [4] registered Dec 13 14:30:59.002880 kernel: acpiphp: Slot [5] registered Dec 13 14:30:59.002895 kernel: acpiphp: Slot [6] registered Dec 13 14:30:59.002915 kernel: acpiphp: Slot [7] registered Dec 13 14:30:59.002930 kernel: acpiphp: Slot [8] registered Dec 13 14:30:59.002944 kernel: acpiphp: Slot [9] registered Dec 13 14:30:59.002959 kernel: acpiphp: Slot [10] registered Dec 13 14:30:59.002973 kernel: acpiphp: Slot [11] registered Dec 13 14:30:59.002988 kernel: acpiphp: Slot [12] registered Dec 13 14:30:59.003002 kernel: acpiphp: Slot [13] registered Dec 13 14:30:59.003017 kernel: acpiphp: Slot [14] registered Dec 13 14:30:59.003031 kernel: acpiphp: Slot [15] registered Dec 13 14:30:59.003046 kernel: acpiphp: Slot [16] registered Dec 13 14:30:59.003064 kernel: acpiphp: Slot [17] registered Dec 13 14:30:59.003079 kernel: acpiphp: Slot [18] registered Dec 13 14:30:59.003093 kernel: acpiphp: Slot [19] registered Dec 13 14:30:59.003107 kernel: acpiphp: Slot [20] registered Dec 13 14:30:59.003122 kernel: acpiphp: Slot [21] registered Dec 13 14:30:59.003136 kernel: acpiphp: Slot [22] registered Dec 13 14:30:59.003151 kernel: acpiphp: Slot [23] registered Dec 13 14:30:59.003165 kernel: acpiphp: Slot [24] registered Dec 13 14:30:59.003180 kernel: acpiphp: Slot [25] registered Dec 13 14:30:59.003197 kernel: acpiphp: Slot [26] registered Dec 13 14:30:59.003212 kernel: acpiphp: Slot [27] registered Dec 13 14:30:59.003226 kernel: acpiphp: Slot [28] registered Dec 13 14:30:59.003241 kernel: acpiphp: Slot [29] registered Dec 13 14:30:59.003255 kernel: acpiphp: Slot [30] registered Dec 13 14:30:59.003270 kernel: acpiphp: Slot [31] registered Dec 13 14:30:59.005315 kernel: PCI host bridge to bus 0000:00 Dec 13 14:30:59.005417 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:30:59.005492 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Dec 13 14:30:59.005578 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:30:59.005657 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Dec 13 14:30:59.005729 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Dec 13 14:30:59.005800 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Dec 13 14:30:59.005893 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Dec 13 14:30:59.005982 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Dec 13 14:30:59.006080 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Dec 13 14:30:59.006162 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] Dec 13 14:30:59.006245 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:30:59.006348 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:30:59.006431 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:30:59.006509 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:30:59.006596 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Dec 13 14:30:59.006683 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Dec 13 14:30:59.006765 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Dec 13 14:30:59.006865 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Dec 13 14:30:59.006947 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Dec 13 14:30:59.007031 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Dec 13 14:30:59.007123 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] Dec 13 14:30:59.007209 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] Dec 13 14:30:59.009326 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:30:59.009441 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Dec 13 14:30:59.009529 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] Dec 13 14:30:59.009611 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] Dec 13 14:30:59.009694 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Dec 13 14:30:59.009773 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] Dec 13 14:30:59.009866 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Dec 13 14:30:59.009948 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Dec 13 14:30:59.010039 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] Dec 13 14:30:59.010121 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Dec 13 14:30:59.010209 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 Dec 13 14:30:59.010338 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] Dec 13 14:30:59.010422 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Dec 13 14:30:59.010512 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 Dec 13 14:30:59.010593 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] Dec 13 14:30:59.010671 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Dec 13 14:30:59.010683 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Dec 13 14:30:59.010692 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Dec 13 14:30:59.010700 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:30:59.010708 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Dec 13 14:30:59.010716 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Dec 13 14:30:59.010729 kernel: iommu: Default domain type: Translated Dec 13 14:30:59.010737 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:30:59.010833 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Dec 13 14:30:59.010920 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:30:59.011004 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Dec 13 14:30:59.011016 kernel: vgaarb: loaded Dec 13 14:30:59.011025 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:30:59.011034 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:30:59.011042 kernel: PTP clock support registered Dec 13 14:30:59.011057 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:30:59.011066 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:30:59.011074 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Dec 13 14:30:59.011083 kernel: e820: reserve RAM buffer [mem 0x7ffdd000-0x7fffffff] Dec 13 14:30:59.011091 kernel: clocksource: Switched to clocksource kvm-clock Dec 13 14:30:59.011100 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:30:59.011108 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:30:59.011117 kernel: pnp: PnP ACPI init Dec 13 14:30:59.011201 kernel: pnp 00:03: [dma 2] Dec 13 14:30:59.011217 kernel: pnp: PnP ACPI: found 5 devices Dec 13 14:30:59.011226 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:30:59.011235 kernel: NET: Registered PF_INET protocol family Dec 13 14:30:59.011243 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:30:59.011252 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:30:59.011261 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:30:59.011270 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:30:59.011294 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:30:59.011305 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:30:59.011314 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:30:59.011322 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:30:59.011331 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:30:59.011339 kernel: NET: Registered PF_XDP protocol family Dec 13 14:30:59.011419 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Dec 13 14:30:59.011494 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Dec 13 14:30:59.011568 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Dec 13 14:30:59.011642 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Dec 13 14:30:59.011720 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Dec 13 14:30:59.011805 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Dec 13 14:30:59.011890 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:30:59.011974 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Dec 13 14:30:59.011986 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:30:59.011995 kernel: Initialise system trusted keyrings Dec 13 14:30:59.012004 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:30:59.012015 kernel: Key type asymmetric registered Dec 13 14:30:59.012024 kernel: Asymmetric key parser 'x509' registered Dec 13 14:30:59.012032 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:30:59.012041 kernel: io scheduler mq-deadline registered Dec 13 14:30:59.012049 kernel: io scheduler kyber registered Dec 13 14:30:59.012058 kernel: io scheduler bfq registered Dec 13 14:30:59.012066 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:30:59.012075 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Dec 13 14:30:59.012084 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Dec 13 14:30:59.012093 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Dec 13 14:30:59.012103 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Dec 13 14:30:59.012111 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:30:59.012120 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:30:59.012129 kernel: random: crng init done Dec 13 14:30:59.012137 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Dec 13 14:30:59.012146 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:30:59.012154 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:30:59.012246 kernel: rtc_cmos 00:04: RTC can wake from S4 Dec 13 14:30:59.012264 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:30:59.012359 kernel: rtc_cmos 00:04: registered as rtc0 Dec 13 14:30:59.012438 kernel: rtc_cmos 00:04: setting system clock to 2024-12-13T14:30:58 UTC (1734100258) Dec 13 14:30:59.012517 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram Dec 13 14:30:59.012529 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:30:59.012537 kernel: Segment Routing with IPv6 Dec 13 14:30:59.012545 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:30:59.012553 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:30:59.012561 kernel: Key type dns_resolver registered Dec 13 14:30:59.012573 kernel: IPI shorthand broadcast: enabled Dec 13 14:30:59.012581 kernel: sched_clock: Marking stable (731038679, 120989683)->(882556133, -30527771) Dec 13 14:30:59.012589 kernel: registered taskstats version 1 Dec 13 14:30:59.012597 kernel: Loading compiled-in X.509 certificates Dec 13 14:30:59.012605 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:30:59.012613 kernel: Key type .fscrypt registered Dec 13 14:30:59.012621 kernel: Key type fscrypt-provisioning registered Dec 13 14:30:59.012629 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:30:59.012639 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:30:59.012647 kernel: ima: No architecture policies found Dec 13 14:30:59.012655 kernel: clk: Disabling unused clocks Dec 13 14:30:59.012663 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:30:59.012671 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:30:59.012679 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:30:59.012687 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:30:59.012695 kernel: Run /init as init process Dec 13 14:30:59.012702 kernel: with arguments: Dec 13 14:30:59.012711 kernel: /init Dec 13 14:30:59.012719 kernel: with environment: Dec 13 14:30:59.012727 kernel: HOME=/ Dec 13 14:30:59.012734 kernel: TERM=linux Dec 13 14:30:59.012742 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:30:59.012753 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:30:59.012763 systemd[1]: Detected virtualization kvm. Dec 13 14:30:59.012772 systemd[1]: Detected architecture x86-64. Dec 13 14:30:59.012783 systemd[1]: Running in initrd. Dec 13 14:30:59.012792 systemd[1]: No hostname configured, using default hostname. Dec 13 14:30:59.012800 systemd[1]: Hostname set to . Dec 13 14:30:59.012809 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:30:59.012818 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:30:59.012826 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:30:59.012834 systemd[1]: Reached target cryptsetup.target. Dec 13 14:30:59.012843 systemd[1]: Reached target paths.target. Dec 13 14:30:59.012854 systemd[1]: Reached target slices.target. Dec 13 14:30:59.012863 systemd[1]: Reached target swap.target. Dec 13 14:30:59.012871 systemd[1]: Reached target timers.target. Dec 13 14:30:59.012880 systemd[1]: Listening on iscsid.socket. Dec 13 14:30:59.012888 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:30:59.012897 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:30:59.012906 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:30:59.012916 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:30:59.012924 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:30:59.012933 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:30:59.012941 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:30:59.012950 systemd[1]: Reached target sockets.target. Dec 13 14:30:59.012971 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:30:59.012982 systemd[1]: Finished network-cleanup.service. Dec 13 14:30:59.012991 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:30:59.013000 systemd[1]: Starting systemd-journald.service... Dec 13 14:30:59.013009 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:30:59.013018 systemd[1]: Starting systemd-resolved.service... Dec 13 14:30:59.013026 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:30:59.013035 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:30:59.013044 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:30:59.013056 systemd-journald[185]: Journal started Dec 13 14:30:59.013099 systemd-journald[185]: Runtime Journal (/run/log/journal/0373b50918f449f4aec8d6bacb73841a) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:30:58.978627 systemd-modules-load[186]: Inserted module 'overlay' Dec 13 14:30:59.040046 systemd[1]: Started systemd-journald.service. Dec 13 14:30:59.040081 kernel: audit: type=1130 audit(1734100259.033:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.026705 systemd-resolved[187]: Positive Trust Anchors: Dec 13 14:30:59.044552 kernel: audit: type=1130 audit(1734100259.040:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.026717 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:30:59.051422 kernel: audit: type=1130 audit(1734100259.044:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.051439 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:30:59.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.026752 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:30:59.058432 kernel: audit: type=1130 audit(1734100259.051:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.058448 kernel: Bridge firewalling registered Dec 13 14:30:59.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.029344 systemd-resolved[187]: Defaulting to hostname 'linux'. Dec 13 14:30:59.040731 systemd[1]: Started systemd-resolved.service. Dec 13 14:30:59.045289 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:30:59.052054 systemd[1]: Reached target nss-lookup.target. Dec 13 14:30:59.052577 systemd-modules-load[186]: Inserted module 'br_netfilter' Dec 13 14:30:59.059610 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:30:59.060685 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:30:59.069240 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:30:59.074077 kernel: audit: type=1130 audit(1734100259.069:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.084074 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:30:59.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.085479 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:30:59.090306 kernel: audit: type=1130 audit(1734100259.084:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.105325 kernel: SCSI subsystem initialized Dec 13 14:30:59.105404 dracut-cmdline[203]: dracut-dracut-053 Dec 13 14:30:59.105404 dracut-cmdline[203]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:30:59.112628 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:30:59.112645 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:30:59.112657 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:30:59.115744 systemd-modules-load[186]: Inserted module 'dm_multipath' Dec 13 14:30:59.116536 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:30:59.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.117731 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:30:59.124841 kernel: audit: type=1130 audit(1734100259.116:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.129529 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:30:59.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.134316 kernel: audit: type=1130 audit(1734100259.129:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.165353 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:30:59.185372 kernel: iscsi: registered transport (tcp) Dec 13 14:30:59.212062 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:30:59.212119 kernel: QLogic iSCSI HBA Driver Dec 13 14:30:59.263000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.262907 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:30:59.269832 kernel: audit: type=1130 audit(1734100259.263:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.265911 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:30:59.349406 kernel: raid6: sse2x4 gen() 11581 MB/s Dec 13 14:30:59.366381 kernel: raid6: sse2x4 xor() 7238 MB/s Dec 13 14:30:59.383376 kernel: raid6: sse2x2 gen() 14802 MB/s Dec 13 14:30:59.400377 kernel: raid6: sse2x2 xor() 8676 MB/s Dec 13 14:30:59.417375 kernel: raid6: sse2x1 gen() 11348 MB/s Dec 13 14:30:59.435128 kernel: raid6: sse2x1 xor() 6908 MB/s Dec 13 14:30:59.435187 kernel: raid6: using algorithm sse2x2 gen() 14802 MB/s Dec 13 14:30:59.435214 kernel: raid6: .... xor() 8676 MB/s, rmw enabled Dec 13 14:30:59.436058 kernel: raid6: using ssse3x2 recovery algorithm Dec 13 14:30:59.451520 kernel: xor: measuring software checksum speed Dec 13 14:30:59.451579 kernel: prefetch64-sse : 17122 MB/sec Dec 13 14:30:59.452591 kernel: generic_sse : 15538 MB/sec Dec 13 14:30:59.452629 kernel: xor: using function: prefetch64-sse (17122 MB/sec) Dec 13 14:30:59.567337 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:30:59.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.585000 audit: BPF prog-id=7 op=LOAD Dec 13 14:30:59.583322 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:30:59.585000 audit: BPF prog-id=8 op=LOAD Dec 13 14:30:59.586745 systemd[1]: Starting systemd-udevd.service... Dec 13 14:30:59.620722 systemd-udevd[385]: Using default interface naming scheme 'v252'. Dec 13 14:30:59.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.632363 systemd[1]: Started systemd-udevd.service. Dec 13 14:30:59.633737 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:30:59.649814 dracut-pre-trigger[388]: rd.md=0: removing MD RAID activation Dec 13 14:30:59.683948 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:30:59.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.685240 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:30:59.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:30:59.723419 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:30:59.771499 kernel: virtio_blk virtio2: [vda] 41943040 512-byte logical blocks (21.5 GB/20.0 GiB) Dec 13 14:30:59.789316 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Dec 13 14:30:59.789335 kernel: GPT:17805311 != 41943039 Dec 13 14:30:59.789347 kernel: GPT:Alternate GPT header not at the end of the disk. Dec 13 14:30:59.789358 kernel: GPT:17805311 != 41943039 Dec 13 14:30:59.789368 kernel: GPT: Use GNU Parted to correct GPT errors. Dec 13 14:30:59.789379 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:30:59.812978 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:30:59.864553 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) Dec 13 14:30:59.864587 kernel: libata version 3.00 loaded. Dec 13 14:30:59.864599 kernel: ata_piix 0000:00:01.1: version 2.13 Dec 13 14:30:59.864787 kernel: scsi host0: ata_piix Dec 13 14:30:59.864897 kernel: scsi host1: ata_piix Dec 13 14:30:59.864995 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 Dec 13 14:30:59.865007 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 Dec 13 14:30:59.867885 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:30:59.868467 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:30:59.879101 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:30:59.883308 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:30:59.885775 systemd[1]: Starting disk-uuid.service... Dec 13 14:30:59.911305 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:30:59.911396 disk-uuid[458]: Primary Header is updated. Dec 13 14:30:59.911396 disk-uuid[458]: Secondary Entries is updated. Dec 13 14:30:59.911396 disk-uuid[458]: Secondary Header is updated. Dec 13 14:31:00.927870 disk-uuid[459]: The operation has completed successfully. Dec 13 14:31:00.928718 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Dec 13 14:31:00.978224 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:31:00.979110 systemd[1]: Finished disk-uuid.service. Dec 13 14:31:00.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:00.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:00.985915 systemd[1]: Starting verity-setup.service... Dec 13 14:31:01.014305 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" Dec 13 14:31:01.115915 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:31:01.120035 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:31:01.126521 systemd[1]: Finished verity-setup.service. Dec 13 14:31:01.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.252336 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:31:01.253106 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:31:01.253749 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:31:01.254540 systemd[1]: Starting ignition-setup.service... Dec 13 14:31:01.257748 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:31:01.287739 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:01.287790 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:31:01.287802 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:31:01.307134 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:31:01.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.330549 systemd[1]: Finished ignition-setup.service. Dec 13 14:31:01.331930 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:31:01.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.409904 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:31:01.413000 audit: BPF prog-id=9 op=LOAD Dec 13 14:31:01.415465 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:01.450606 systemd-networkd[629]: lo: Link UP Dec 13 14:31:01.450620 systemd-networkd[629]: lo: Gained carrier Dec 13 14:31:01.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.451117 systemd-networkd[629]: Enumeration completed Dec 13 14:31:01.451365 systemd-networkd[629]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:01.452804 systemd-networkd[629]: eth0: Link UP Dec 13 14:31:01.452808 systemd-networkd[629]: eth0: Gained carrier Dec 13 14:31:01.453476 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:01.455832 systemd[1]: Reached target network.target. Dec 13 14:31:01.459825 systemd[1]: Starting iscsiuio.service... Dec 13 14:31:01.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.468463 systemd[1]: Started iscsiuio.service. Dec 13 14:31:01.470618 systemd[1]: Starting iscsid.service... Dec 13 14:31:01.476428 systemd-networkd[629]: eth0: DHCPv4 address 172.24.4.208/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:31:01.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.476617 systemd[1]: Started iscsid.service. Dec 13 14:31:01.480945 iscsid[634]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:01.480945 iscsid[634]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:31:01.480945 iscsid[634]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:31:01.480945 iscsid[634]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:31:01.480945 iscsid[634]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:31:01.480945 iscsid[634]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:31:01.480945 iscsid[634]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:31:01.478477 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:31:01.491883 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:31:01.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.492438 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:31:01.492849 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:01.493360 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:01.494560 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:31:01.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.504553 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:31:01.657559 ignition[586]: Ignition 2.14.0 Dec 13 14:31:01.658363 ignition[586]: Stage: fetch-offline Dec 13 14:31:01.658445 ignition[586]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:01.661486 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:31:01.658474 ignition[586]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:01.659556 ignition[586]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:01.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:01.659667 ignition[586]: parsed url from cmdline: "" Dec 13 14:31:01.664544 systemd[1]: Starting ignition-fetch.service... Dec 13 14:31:01.659671 ignition[586]: no config URL provided Dec 13 14:31:01.659677 ignition[586]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:31:01.659686 ignition[586]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:31:01.659695 ignition[586]: failed to fetch config: resource requires networking Dec 13 14:31:01.660108 ignition[586]: Ignition finished successfully Dec 13 14:31:01.683361 ignition[653]: Ignition 2.14.0 Dec 13 14:31:01.683389 ignition[653]: Stage: fetch Dec 13 14:31:01.683623 ignition[653]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:01.683666 ignition[653]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:01.685936 ignition[653]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:01.686174 ignition[653]: parsed url from cmdline: "" Dec 13 14:31:01.686185 ignition[653]: no config URL provided Dec 13 14:31:01.686198 ignition[653]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:31:01.686217 ignition[653]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:31:01.687679 ignition[653]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... Dec 13 14:31:01.687766 ignition[653]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... Dec 13 14:31:01.691588 ignition[653]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 Dec 13 14:31:02.029967 ignition[653]: GET result: OK Dec 13 14:31:02.030395 ignition[653]: parsing config with SHA512: 32ae129909f5a83b9afbeaff255c0ee32929542dd0b334c60b88e979a89129affe8a12a01cc73465114f4141af3dc63d8f97a0f56186ef9a8183aff42d9e86eb Dec 13 14:31:02.043639 unknown[653]: fetched base config from "system" Dec 13 14:31:02.044356 unknown[653]: fetched base config from "system" Dec 13 14:31:02.044864 unknown[653]: fetched user config from "openstack" Dec 13 14:31:02.046688 ignition[653]: fetch: fetch complete Dec 13 14:31:02.047193 ignition[653]: fetch: fetch passed Dec 13 14:31:02.047751 ignition[653]: Ignition finished successfully Dec 13 14:31:02.049993 systemd[1]: Finished ignition-fetch.service. Dec 13 14:31:02.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.053008 systemd[1]: Starting ignition-kargs.service... Dec 13 14:31:02.064740 ignition[659]: Ignition 2.14.0 Dec 13 14:31:02.065547 ignition[659]: Stage: kargs Dec 13 14:31:02.066106 ignition[659]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:02.070448 ignition[659]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:02.071403 ignition[659]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:02.072512 ignition[659]: kargs: kargs passed Dec 13 14:31:02.072557 ignition[659]: Ignition finished successfully Dec 13 14:31:02.074474 systemd[1]: Finished ignition-kargs.service. Dec 13 14:31:02.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.077038 systemd[1]: Starting ignition-disks.service... Dec 13 14:31:02.085219 ignition[665]: Ignition 2.14.0 Dec 13 14:31:02.085233 ignition[665]: Stage: disks Dec 13 14:31:02.085404 ignition[665]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:02.085426 ignition[665]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:02.089407 systemd[1]: Finished ignition-disks.service. Dec 13 14:31:02.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.086395 ignition[665]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:02.090750 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:31:02.087598 ignition[665]: disks: disks passed Dec 13 14:31:02.092107 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:02.087651 ignition[665]: Ignition finished successfully Dec 13 14:31:02.093810 systemd[1]: Reached target local-fs.target. Dec 13 14:31:02.095391 systemd[1]: Reached target sysinit.target. Dec 13 14:31:02.096782 systemd[1]: Reached target basic.target. Dec 13 14:31:02.100004 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:31:02.125591 systemd-fsck[672]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:31:02.134599 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:31:02.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.138267 systemd[1]: Mounting sysroot.mount... Dec 13 14:31:02.153344 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:31:02.153879 systemd[1]: Mounted sysroot.mount. Dec 13 14:31:02.154445 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:31:02.157517 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:31:02.158356 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:31:02.159046 systemd[1]: Starting flatcar-openstack-hostname.service... Dec 13 14:31:02.161789 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:31:02.161819 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:31:02.167754 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:31:02.173635 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:02.174750 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:31:02.182091 initrd-setup-root[684]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:31:02.187891 initrd-setup-root[692]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:31:02.197188 initrd-setup-root[700]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:31:02.200456 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (679) Dec 13 14:31:02.205855 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:02.205887 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:31:02.205899 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:31:02.206511 initrd-setup-root[708]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:31:02.231053 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:02.297788 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:31:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.299163 systemd[1]: Starting ignition-mount.service... Dec 13 14:31:02.303603 systemd[1]: Starting sysroot-boot.service... Dec 13 14:31:02.312947 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:02.313054 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:02.347753 ignition[746]: INFO : Ignition 2.14.0 Dec 13 14:31:02.347753 ignition[746]: INFO : Stage: mount Dec 13 14:31:02.348949 ignition[746]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:02.348949 ignition[746]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:02.351331 ignition[746]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:02.351331 ignition[746]: INFO : mount: mount passed Dec 13 14:31:02.351331 ignition[746]: INFO : Ignition finished successfully Dec 13 14:31:02.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.352261 systemd[1]: Finished sysroot-boot.service. Dec 13 14:31:02.353185 systemd[1]: Finished ignition-mount.service. Dec 13 14:31:02.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.379812 coreos-metadata[678]: Dec 13 14:31:02.379 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 Dec 13 14:31:02.398715 coreos-metadata[678]: Dec 13 14:31:02.398 INFO Fetch successful Dec 13 14:31:02.400202 coreos-metadata[678]: Dec 13 14:31:02.399 INFO wrote hostname ci-3510-3-6-7-e74dd619d7.novalocal to /sysroot/etc/hostname Dec 13 14:31:02.402979 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. Dec 13 14:31:02.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:02.403143 systemd[1]: Finished flatcar-openstack-hostname.service. Dec 13 14:31:02.405731 systemd[1]: Starting ignition-files.service... Dec 13 14:31:02.417019 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:31:02.431856 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (755) Dec 13 14:31:02.436975 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:31:02.437032 kernel: BTRFS info (device vda6): using free space tree Dec 13 14:31:02.437059 kernel: BTRFS info (device vda6): has skinny extents Dec 13 14:31:02.453438 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:31:02.476916 ignition[774]: INFO : Ignition 2.14.0 Dec 13 14:31:02.476916 ignition[774]: INFO : Stage: files Dec 13 14:31:02.479108 ignition[774]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:02.479108 ignition[774]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:02.482564 ignition[774]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:02.552047 ignition[774]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:31:02.567791 ignition[774]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:31:02.567791 ignition[774]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:31:02.633342 ignition[774]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:31:02.635203 ignition[774]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:31:02.660976 unknown[774]: wrote ssh authorized keys file for user: core Dec 13 14:31:02.663109 ignition[774]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:31:02.663109 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:31:02.663109 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:31:02.744144 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:31:02.968489 systemd-networkd[629]: eth0: Gained IPv6LL Dec 13 14:31:03.034896 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:31:03.034896 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:31:03.039224 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 Dec 13 14:31:03.551524 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Dec 13 14:31:05.225402 ignition[774]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" Dec 13 14:31:05.225402 ignition[774]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:31:05.225402 ignition[774]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" Dec 13 14:31:05.225402 ignition[774]: INFO : files: op(c): [started] processing unit "prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:31:05.233995 ignition[774]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:31:05.233995 ignition[774]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:31:05.233995 ignition[774]: INFO : files: files passed Dec 13 14:31:05.233995 ignition[774]: INFO : Ignition finished successfully Dec 13 14:31:05.259032 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 14:31:05.259057 kernel: audit: type=1130 audit(1734100265.235:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.233526 systemd[1]: Finished ignition-files.service. Dec 13 14:31:05.268015 kernel: audit: type=1130 audit(1734100265.260:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.268034 kernel: audit: type=1131 audit(1734100265.260:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.260000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.236141 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:31:05.273368 kernel: audit: type=1130 audit(1734100265.268:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.251151 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:31:05.275399 initrd-setup-root-after-ignition[798]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:31:05.252798 systemd[1]: Starting ignition-quench.service... Dec 13 14:31:05.258841 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:31:05.259039 systemd[1]: Finished ignition-quench.service. Dec 13 14:31:05.261253 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:31:05.269447 systemd[1]: Reached target ignition-complete.target. Dec 13 14:31:05.275909 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:31:05.301772 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:31:05.301985 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:31:05.311133 kernel: audit: type=1130 audit(1734100265.303:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.311157 kernel: audit: type=1131 audit(1734100265.303:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.304089 systemd[1]: Reached target initrd-fs.target. Dec 13 14:31:05.312226 systemd[1]: Reached target initrd.target. Dec 13 14:31:05.313811 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:31:05.315547 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:31:05.331378 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:31:05.337081 kernel: audit: type=1130 audit(1734100265.332:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.334139 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:31:05.353570 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:31:05.355563 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:31:05.358014 systemd[1]: Stopped target timers.target. Dec 13 14:31:05.359384 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:31:05.368184 kernel: audit: type=1131 audit(1734100265.361:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.359687 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:31:05.361631 systemd[1]: Stopped target initrd.target. Dec 13 14:31:05.369464 systemd[1]: Stopped target basic.target. Dec 13 14:31:05.371367 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:31:05.373418 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:31:05.375408 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:31:05.377410 systemd[1]: Stopped target remote-fs.target. Dec 13 14:31:05.379373 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:31:05.381349 systemd[1]: Stopped target sysinit.target. Dec 13 14:31:05.383264 systemd[1]: Stopped target local-fs.target. Dec 13 14:31:05.385166 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:31:05.387022 systemd[1]: Stopped target swap.target. Dec 13 14:31:05.397622 kernel: audit: type=1131 audit(1734100265.390:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.388750 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:31:05.389097 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:31:05.391033 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:31:05.401460 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:31:05.412907 kernel: audit: type=1131 audit(1734100265.403:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.401668 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:31:05.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.403791 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:31:05.415000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.403998 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:31:05.413951 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:31:05.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.432000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.414131 systemd[1]: Stopped ignition-files.service. Dec 13 14:31:05.437155 ignition[812]: INFO : Ignition 2.14.0 Dec 13 14:31:05.437155 ignition[812]: INFO : Stage: umount Dec 13 14:31:05.437155 ignition[812]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:31:05.437155 ignition[812]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a Dec 13 14:31:05.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.417570 systemd[1]: Stopping ignition-mount.service... Dec 13 14:31:05.445384 ignition[812]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" Dec 13 14:31:05.422575 systemd[1]: Stopping iscsiuio.service... Dec 13 14:31:05.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.427644 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:31:05.428862 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:31:05.449846 ignition[812]: INFO : umount: umount passed Dec 13 14:31:05.449846 ignition[812]: INFO : Ignition finished successfully Dec 13 14:31:05.429191 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:31:05.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.457000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.431263 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:31:05.431633 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:31:05.441969 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:31:05.442076 systemd[1]: Stopped iscsiuio.service. Dec 13 14:31:05.446869 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:31:05.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.446973 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:31:05.455583 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:31:05.455665 systemd[1]: Stopped ignition-mount.service. Dec 13 14:31:05.456305 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:31:05.456347 systemd[1]: Stopped ignition-disks.service. Dec 13 14:31:05.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.456803 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:31:05.456839 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:31:05.457322 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:31:05.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.457369 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:31:05.457864 systemd[1]: Stopped target network.target. Dec 13 14:31:05.458293 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:31:05.458332 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:31:05.458817 systemd[1]: Stopped target paths.target. Dec 13 14:31:05.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.459327 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:31:05.462350 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:31:05.463224 systemd[1]: Stopped target slices.target. Dec 13 14:31:05.463655 systemd[1]: Stopped target sockets.target. Dec 13 14:31:05.464087 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:31:05.464115 systemd[1]: Closed iscsid.socket. Dec 13 14:31:05.464637 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:31:05.493000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:31:05.464671 systemd[1]: Closed iscsiuio.socket. Dec 13 14:31:05.465059 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:31:05.465094 systemd[1]: Stopped ignition-setup.service. Dec 13 14:31:05.466000 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:31:05.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.466516 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:31:05.468033 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:31:05.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.470364 systemd-networkd[629]: eth0: DHCPv6 lease lost Dec 13 14:31:05.497000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:31:05.471462 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:31:05.471617 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:31:05.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.473149 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:31:05.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.473190 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:31:05.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.474531 systemd[1]: Stopping network-cleanup.service... Dec 13 14:31:05.475491 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:31:05.475539 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:31:05.477395 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:31:05.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.477468 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:31:05.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.478002 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:31:05.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.478043 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:31:05.482484 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:31:05.484894 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:31:05.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.486584 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:31:05.486687 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:31:05.494901 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:31:05.495053 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:31:05.496779 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:31:05.496880 systemd[1]: Stopped network-cleanup.service. Dec 13 14:31:05.497837 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:31:05.497874 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:31:05.498614 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:31:05.498644 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:31:05.499666 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:31:05.499708 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:31:05.500709 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:31:05.500749 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:31:05.501617 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:31:05.501653 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:31:05.503382 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:31:05.510639 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:31:05.510696 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:31:05.512121 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:31:05.512178 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:31:05.512886 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:31:05.512927 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:31:05.514855 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:31:05.515420 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:31:05.515517 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:31:05.973086 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:31:05.973372 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:31:05.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.976015 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:31:05.977835 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:31:05.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:05.977934 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:31:05.981649 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:31:06.022297 systemd[1]: Switching root. Dec 13 14:31:06.058992 iscsid[634]: iscsid shutting down. Dec 13 14:31:06.060350 systemd-journald[185]: Received SIGTERM from PID 1 (n/a). Dec 13 14:31:06.060486 systemd-journald[185]: Journal stopped Dec 13 14:31:10.602607 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:31:10.602669 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:31:10.602683 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:31:10.602695 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:31:10.602706 kernel: SELinux: policy capability open_perms=1 Dec 13 14:31:10.602719 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:31:10.602730 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:31:10.602741 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:31:10.602756 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:31:10.602767 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:31:10.602782 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:31:10.602813 systemd[1]: Successfully loaded SELinux policy in 88.966ms. Dec 13 14:31:10.602836 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.506ms. Dec 13 14:31:10.602853 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:31:10.602868 systemd[1]: Detected virtualization kvm. Dec 13 14:31:10.602880 systemd[1]: Detected architecture x86-64. Dec 13 14:31:10.602896 systemd[1]: Detected first boot. Dec 13 14:31:10.602911 systemd[1]: Hostname set to . Dec 13 14:31:10.602924 systemd[1]: Initializing machine ID from VM UUID. Dec 13 14:31:10.602939 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:31:10.602952 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:31:10.602966 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:10.602979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:10.602995 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:10.603009 kernel: kauditd_printk_skb: 48 callbacks suppressed Dec 13 14:31:10.603021 kernel: audit: type=1334 audit(1734100270.351:89): prog-id=12 op=LOAD Dec 13 14:31:10.603033 kernel: audit: type=1334 audit(1734100270.351:90): prog-id=3 op=UNLOAD Dec 13 14:31:10.603044 kernel: audit: type=1334 audit(1734100270.352:91): prog-id=13 op=LOAD Dec 13 14:31:10.603056 kernel: audit: type=1334 audit(1734100270.354:92): prog-id=14 op=LOAD Dec 13 14:31:10.603067 kernel: audit: type=1334 audit(1734100270.354:93): prog-id=4 op=UNLOAD Dec 13 14:31:10.603078 kernel: audit: type=1334 audit(1734100270.354:94): prog-id=5 op=UNLOAD Dec 13 14:31:10.603091 kernel: audit: type=1334 audit(1734100270.359:95): prog-id=15 op=LOAD Dec 13 14:31:10.603103 kernel: audit: type=1334 audit(1734100270.359:96): prog-id=12 op=UNLOAD Dec 13 14:31:10.603115 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:31:10.603127 kernel: audit: type=1334 audit(1734100270.360:97): prog-id=16 op=LOAD Dec 13 14:31:10.603138 kernel: audit: type=1334 audit(1734100270.362:98): prog-id=17 op=LOAD Dec 13 14:31:10.603150 systemd[1]: Stopped iscsid.service. Dec 13 14:31:10.603163 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:31:10.603177 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:31:10.603190 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:31:10.603205 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:31:10.603218 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:31:10.603231 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Dec 13 14:31:10.603244 systemd[1]: Created slice system-getty.slice. Dec 13 14:31:10.603256 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:31:10.603270 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:31:10.604664 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:31:10.604681 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:31:10.604713 systemd[1]: Created slice user.slice. Dec 13 14:31:10.604727 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:31:10.604740 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:31:10.604753 systemd[1]: Set up automount boot.automount. Dec 13 14:31:10.604765 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:31:10.604777 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:31:10.604790 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:31:10.604806 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:31:10.604818 systemd[1]: Reached target integritysetup.target. Dec 13 14:31:10.604831 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:31:10.604843 systemd[1]: Reached target remote-fs.target. Dec 13 14:31:10.604855 systemd[1]: Reached target slices.target. Dec 13 14:31:10.604868 systemd[1]: Reached target swap.target. Dec 13 14:31:10.604880 systemd[1]: Reached target torcx.target. Dec 13 14:31:10.604894 systemd[1]: Reached target veritysetup.target. Dec 13 14:31:10.604908 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:31:10.604923 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:31:10.604935 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:31:10.604948 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:31:10.604962 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:31:10.604974 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:31:10.604987 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:31:10.605000 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:31:10.605012 systemd[1]: Mounting media.mount... Dec 13 14:31:10.605025 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:10.605040 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:31:10.605052 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:31:10.605064 systemd[1]: Mounting tmp.mount... Dec 13 14:31:10.605077 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:31:10.605090 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:10.605102 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:31:10.605115 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:31:10.605127 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:10.605140 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:10.605154 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:10.605167 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:31:10.605180 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:10.605194 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:31:10.605206 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:31:10.605219 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:31:10.605231 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:31:10.605244 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:31:10.605256 systemd[1]: Stopped systemd-journald.service. Dec 13 14:31:10.605270 systemd[1]: Starting systemd-journald.service... Dec 13 14:31:10.605307 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:31:10.605320 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:31:10.605333 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:31:10.605346 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:31:10.605359 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:31:10.605371 systemd[1]: Stopped verity-setup.service. Dec 13 14:31:10.605384 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:10.605396 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:31:10.605411 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:31:10.605425 systemd[1]: Mounted media.mount. Dec 13 14:31:10.605437 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:31:10.605449 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:31:10.605460 systemd[1]: Mounted tmp.mount. Dec 13 14:31:10.605472 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:31:10.605484 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:31:10.605495 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:31:10.605507 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:10.605521 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:10.605532 kernel: fuse: init (API version 7.34) Dec 13 14:31:10.605543 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:10.605555 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:10.605567 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:10.605582 systemd-journald[933]: Journal started Dec 13 14:31:10.605625 systemd-journald[933]: Runtime Journal (/run/log/journal/0373b50918f449f4aec8d6bacb73841a) is 4.9M, max 39.5M, 34.5M free. Dec 13 14:31:06.369000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:31:06.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:31:06.476000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:31:06.476000 audit: BPF prog-id=10 op=LOAD Dec 13 14:31:06.476000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:31:06.476000 audit: BPF prog-id=11 op=LOAD Dec 13 14:31:06.476000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:31:06.669000 audit[846]: AVC avc: denied { associate } for pid=846 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:31:06.669000 audit[846]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018a7d2 a1=c00018ea80 a2=c00019ccc0 a3=32 items=0 ppid=829 pid=846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.669000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:31:06.674000 audit[846]: AVC avc: denied { associate } for pid=846 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:31:06.674000 audit[846]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018a8a9 a2=1ed a3=0 items=2 ppid=829 pid=846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:06.674000 audit: CWD cwd="/" Dec 13 14:31:06.674000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:06.674000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:06.674000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:31:10.351000 audit: BPF prog-id=12 op=LOAD Dec 13 14:31:10.351000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:31:10.352000 audit: BPF prog-id=13 op=LOAD Dec 13 14:31:10.354000 audit: BPF prog-id=14 op=LOAD Dec 13 14:31:10.354000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:31:10.354000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:31:10.359000 audit: BPF prog-id=15 op=LOAD Dec 13 14:31:10.359000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:31:10.360000 audit: BPF prog-id=16 op=LOAD Dec 13 14:31:10.362000 audit: BPF prog-id=17 op=LOAD Dec 13 14:31:10.362000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:31:10.362000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:31:10.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.376000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:31:10.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.540000 audit: BPF prog-id=18 op=LOAD Dec 13 14:31:10.541000 audit: BPF prog-id=19 op=LOAD Dec 13 14:31:10.541000 audit: BPF prog-id=20 op=LOAD Dec 13 14:31:10.541000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:31:10.541000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:31:10.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.600000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:31:10.600000 audit[933]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffed405c340 a2=4000 a3=7ffed405c3dc items=0 ppid=1 pid=933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:10.600000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:31:10.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.349726 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:31:06.663768 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:10.349739 systemd[1]: Unnecessary job was removed for dev-vda6.device. Dec 13 14:31:06.665252 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:31:10.363969 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:31:06.665361 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:31:06.665443 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:31:06.665475 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:31:06.665559 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:31:06.665596 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:31:06.666053 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:31:06.666135 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:31:06.666169 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:31:06.668009 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:31:06.668106 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:31:06.668167 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:31:06.668210 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:31:06.668256 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:31:06.668345 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:06Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:31:09.932534 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:09.932856 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:09.932983 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:09.933194 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:31:09.933260 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:31:09.933364 /usr/lib/systemd/system-generators/torcx-generator[846]: time="2024-12-13T14:31:09Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:31:10.617191 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:10.617238 systemd[1]: Started systemd-journald.service. Dec 13 14:31:10.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.615000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.619000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.618530 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:31:10.619186 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:31:10.619489 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:31:10.620239 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:31:10.622885 kernel: loop: module loaded Dec 13 14:31:10.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.622117 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:31:10.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.623424 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:31:10.624130 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:10.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.624533 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:10.625509 systemd[1]: Reached target network-pre.target. Dec 13 14:31:10.627258 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:31:10.628734 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:31:10.631790 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:31:10.635676 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:31:10.637183 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:31:10.637772 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:10.638751 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:31:10.639702 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:10.640747 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:31:10.645096 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:31:10.649406 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:31:10.650013 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:31:10.655340 systemd-journald[933]: Time spent on flushing to /var/log/journal/0373b50918f449f4aec8d6bacb73841a is 26.090ms for 1109 entries. Dec 13 14:31:10.655340 systemd-journald[933]: System Journal (/var/log/journal/0373b50918f449f4aec8d6bacb73841a) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:31:10.738745 systemd-journald[933]: Received client request to flush runtime journal. Dec 13 14:31:10.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.672459 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:31:10.751695 udevadm[956]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:31:10.674134 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:31:10.674829 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:31:10.675620 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:31:10.690645 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:31:10.741548 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:31:10.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.758395 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:31:10.761257 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:31:10.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:10.805195 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:31:11.428114 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:31:11.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.430000 audit: BPF prog-id=21 op=LOAD Dec 13 14:31:11.430000 audit: BPF prog-id=22 op=LOAD Dec 13 14:31:11.430000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:31:11.430000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:31:11.432359 systemd[1]: Starting systemd-udevd.service... Dec 13 14:31:11.474723 systemd-udevd[961]: Using default interface naming scheme 'v252'. Dec 13 14:31:11.534036 systemd[1]: Started systemd-udevd.service. Dec 13 14:31:11.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.538000 audit: BPF prog-id=23 op=LOAD Dec 13 14:31:11.544621 systemd[1]: Starting systemd-networkd.service... Dec 13 14:31:11.566000 audit: BPF prog-id=24 op=LOAD Dec 13 14:31:11.567000 audit: BPF prog-id=25 op=LOAD Dec 13 14:31:11.567000 audit: BPF prog-id=26 op=LOAD Dec 13 14:31:11.569196 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:31:11.626000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.626319 systemd[1]: Started systemd-userdbd.service. Dec 13 14:31:11.638754 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:31:11.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.715733 systemd-networkd[970]: lo: Link UP Dec 13 14:31:11.715742 systemd-networkd[970]: lo: Gained carrier Dec 13 14:31:11.716193 systemd-networkd[970]: Enumeration completed Dec 13 14:31:11.716316 systemd[1]: Started systemd-networkd.service. Dec 13 14:31:11.717551 systemd-networkd[970]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:31:11.719367 systemd-networkd[970]: eth0: Link UP Dec 13 14:31:11.719373 systemd-networkd[970]: eth0: Gained carrier Dec 13 14:31:11.726319 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:31:11.730515 systemd-networkd[970]: eth0: DHCPv4 address 172.24.4.208/24, gateway 172.24.4.1 acquired from 172.24.4.1 Dec 13 14:31:11.733307 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:31:11.741349 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:31:11.723000 audit[971]: AVC avc: denied { confidentiality } for pid=971 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:31:11.723000 audit[971]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55dfd2a2f810 a1=337fc a2=7fa7e311fbc5 a3=5 items=110 ppid=961 pid=971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:11.723000 audit: CWD cwd="/" Dec 13 14:31:11.723000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=1 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=2 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=3 name=(null) inode=14606 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=4 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=5 name=(null) inode=14607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=6 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=7 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=8 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=9 name=(null) inode=14609 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=10 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=11 name=(null) inode=14610 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=12 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=13 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=14 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=15 name=(null) inode=14612 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=16 name=(null) inode=14608 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=17 name=(null) inode=14613 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=18 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=19 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=20 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=21 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=22 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=23 name=(null) inode=14616 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=24 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=25 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=26 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=27 name=(null) inode=14618 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=28 name=(null) inode=14614 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=29 name=(null) inode=14619 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=30 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=31 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=32 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=33 name=(null) inode=14621 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=34 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=35 name=(null) inode=14622 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=36 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=37 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=38 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=39 name=(null) inode=14624 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=40 name=(null) inode=14620 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=41 name=(null) inode=14625 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=42 name=(null) inode=14605 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=43 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=44 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=45 name=(null) inode=14627 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=46 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=47 name=(null) inode=14628 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=48 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=49 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=50 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=51 name=(null) inode=14630 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=52 name=(null) inode=14626 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=53 name=(null) inode=14631 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=55 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=56 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=57 name=(null) inode=14633 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=58 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=59 name=(null) inode=14634 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=60 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=61 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=62 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=63 name=(null) inode=14636 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=64 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=65 name=(null) inode=14637 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=66 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=67 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=68 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=69 name=(null) inode=14639 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=70 name=(null) inode=14635 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=71 name=(null) inode=14640 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=72 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=73 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=74 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=75 name=(null) inode=14642 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=76 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=77 name=(null) inode=14643 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=78 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=79 name=(null) inode=14644 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=80 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=81 name=(null) inode=14645 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=82 name=(null) inode=14641 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=83 name=(null) inode=14646 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=84 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=85 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=86 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=87 name=(null) inode=14648 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=88 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=89 name=(null) inode=14649 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=90 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=91 name=(null) inode=14650 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=92 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=93 name=(null) inode=14651 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=94 name=(null) inode=14647 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=95 name=(null) inode=14652 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=96 name=(null) inode=14632 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=97 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=98 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=99 name=(null) inode=14654 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=100 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=101 name=(null) inode=14655 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=102 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=103 name=(null) inode=14656 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=104 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=105 name=(null) inode=14657 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=106 name=(null) inode=14653 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=107 name=(null) inode=14658 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PATH item=109 name=(null) inode=14659 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:31:11.723000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:31:11.770429 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Dec 13 14:31:11.774314 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:31:11.782322 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:31:11.833714 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:31:11.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.835480 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:31:11.873568 lvm[990]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:11.916237 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:31:11.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.917700 systemd[1]: Reached target cryptsetup.target. Dec 13 14:31:11.920995 systemd[1]: Starting lvm2-activation.service... Dec 13 14:31:11.930120 lvm[991]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:31:11.992390 systemd[1]: Finished lvm2-activation.service. Dec 13 14:31:11.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:11.993694 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:31:11.994866 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:31:11.994928 systemd[1]: Reached target local-fs.target. Dec 13 14:31:11.996045 systemd[1]: Reached target machines.target. Dec 13 14:31:11.999784 systemd[1]: Starting ldconfig.service... Dec 13 14:31:12.151588 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:12.151733 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:12.154167 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:31:12.157504 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:31:12.160952 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:31:12.164958 systemd[1]: Starting systemd-sysext.service... Dec 13 14:31:12.196950 systemd[1]: boot.automount: Got automount request for /boot, triggered by 993 (bootctl) Dec 13 14:31:12.199616 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:31:12.289902 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:31:12.304926 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:31:12.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.314512 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:31:12.314899 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:31:12.595528 kernel: loop0: detected capacity change from 0 to 210664 Dec 13 14:31:12.646365 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:31:12.648710 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:31:12.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.698387 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:31:12.730411 kernel: loop1: detected capacity change from 0 to 210664 Dec 13 14:31:12.761698 systemd-networkd[970]: eth0: Gained IPv6LL Dec 13 14:31:12.781891 (sd-sysext)[1006]: Using extensions 'kubernetes'. Dec 13 14:31:12.785679 (sd-sysext)[1006]: Merged extensions into '/usr'. Dec 13 14:31:12.816257 systemd-fsck[1003]: fsck.fat 4.2 (2021-01-31) Dec 13 14:31:12.816257 systemd-fsck[1003]: /dev/vda1: 789 files, 119291/258078 clusters Dec 13 14:31:12.833137 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:31:12.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.837412 systemd[1]: Mounting boot.mount... Dec 13 14:31:12.838135 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:12.839724 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:31:12.844048 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:12.847031 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:12.848843 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:12.850521 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:12.851463 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:12.851612 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:12.851769 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:12.858023 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:31:12.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.859685 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:12.859831 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:12.860908 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:12.861038 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:12.862198 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:12.865000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:12.865377 systemd[1]: Finished systemd-sysext.service. Dec 13 14:31:12.866064 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:12.866182 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:12.868523 systemd[1]: Starting ensure-sysext.service... Dec 13 14:31:12.869632 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:12.870801 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:31:12.881543 systemd[1]: Reloading. Dec 13 14:31:12.892486 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:31:12.893519 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:31:12.897460 systemd-tmpfiles[1014]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:31:12.985973 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-12-13T14:31:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:31:12.989394 /usr/lib/systemd/system-generators/torcx-generator[1034]: time="2024-12-13T14:31:12Z" level=info msg="torcx already run" Dec 13 14:31:13.095744 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:31:13.095965 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:31:13.118945 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:31:13.177000 audit: BPF prog-id=27 op=LOAD Dec 13 14:31:13.177000 audit: BPF prog-id=28 op=LOAD Dec 13 14:31:13.177000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:31:13.177000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:31:13.179000 audit: BPF prog-id=29 op=LOAD Dec 13 14:31:13.179000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:31:13.179000 audit: BPF prog-id=30 op=LOAD Dec 13 14:31:13.179000 audit: BPF prog-id=31 op=LOAD Dec 13 14:31:13.179000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:31:13.180000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:31:13.181000 audit: BPF prog-id=32 op=LOAD Dec 13 14:31:13.181000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:31:13.182000 audit: BPF prog-id=33 op=LOAD Dec 13 14:31:13.182000 audit: BPF prog-id=34 op=LOAD Dec 13 14:31:13.182000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:31:13.182000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:31:13.183000 audit: BPF prog-id=35 op=LOAD Dec 13 14:31:13.183000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:31:13.188231 systemd[1]: Mounted boot.mount. Dec 13 14:31:13.207967 systemd[1]: Finished ensure-sysext.service. Dec 13 14:31:13.208000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.209815 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:31:13.211070 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:31:13.212864 systemd[1]: Starting modprobe@drm.service... Dec 13 14:31:13.214540 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:31:13.216711 systemd[1]: Starting modprobe@loop.service... Dec 13 14:31:13.217901 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:31:13.218027 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:13.219183 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:31:13.221009 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:31:13.221144 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:31:13.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.221000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.222129 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:31:13.222244 systemd[1]: Finished modprobe@drm.service. Dec 13 14:31:13.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.223265 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:31:13.223503 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:31:13.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.224413 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:31:13.224609 systemd[1]: Finished modprobe@loop.service. Dec 13 14:31:13.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.225506 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:31:13.225611 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:31:13.270342 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:31:13.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:13.310644 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:13.310699 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:31:13.509612 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:31:13.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.264075 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:31:14.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.266207 systemd[1]: Starting audit-rules.service... Dec 13 14:31:14.267692 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:31:14.270000 audit: BPF prog-id=36 op=LOAD Dec 13 14:31:14.269456 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:31:14.273000 audit: BPF prog-id=37 op=LOAD Dec 13 14:31:14.272862 systemd[1]: Starting systemd-resolved.service... Dec 13 14:31:14.275082 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:31:14.278978 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:31:14.288852 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:31:14.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.289494 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:31:14.312000 audit[1091]: SYSTEM_BOOT pid=1091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.316011 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:31:14.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.346023 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:31:14.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:14.369000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:31:14.369000 audit[1106]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdbaf70f50 a2=420 a3=0 items=0 ppid=1086 pid=1106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:14.369000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:31:14.370351 augenrules[1106]: No rules Dec 13 14:31:14.370425 systemd[1]: Finished audit-rules.service. Dec 13 14:31:14.388480 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:31:14.389082 systemd[1]: Reached target time-set.target. Dec 13 14:31:14.416994 systemd-resolved[1089]: Positive Trust Anchors: Dec 13 14:31:14.836200 systemd-resolved[1089]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:31:14.836302 systemd-resolved[1089]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:31:14.836344 systemd-timesyncd[1090]: Contacted time server 193.52.136.2:123 (0.flatcar.pool.ntp.org). Dec 13 14:31:14.836444 systemd-timesyncd[1090]: Initial clock synchronization to Fri 2024-12-13 14:31:14.836177 UTC. Dec 13 14:31:14.845078 systemd-resolved[1089]: Using system hostname 'ci-3510-3-6-7-e74dd619d7.novalocal'. Dec 13 14:31:14.847011 systemd[1]: Started systemd-resolved.service. Dec 13 14:31:14.847617 systemd[1]: Reached target network.target. Dec 13 14:31:14.848058 systemd[1]: Reached target network-online.target. Dec 13 14:31:14.848534 systemd[1]: Reached target nss-lookup.target. Dec 13 14:31:14.861300 ldconfig[992]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:31:14.886161 systemd[1]: Finished ldconfig.service. Dec 13 14:31:14.890553 systemd[1]: Starting systemd-update-done.service... Dec 13 14:31:14.898726 systemd[1]: Finished systemd-update-done.service. Dec 13 14:31:14.900219 systemd[1]: Reached target sysinit.target. Dec 13 14:31:14.901693 systemd[1]: Started motdgen.path. Dec 13 14:31:14.902967 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:31:14.904356 systemd[1]: Started logrotate.timer. Dec 13 14:31:14.904890 systemd[1]: Started mdadm.timer. Dec 13 14:31:14.905371 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:31:14.905872 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:31:14.905909 systemd[1]: Reached target paths.target. Dec 13 14:31:14.906380 systemd[1]: Reached target timers.target. Dec 13 14:31:14.907144 systemd[1]: Listening on dbus.socket. Dec 13 14:31:14.908694 systemd[1]: Starting docker.socket... Dec 13 14:31:14.913809 systemd[1]: Listening on sshd.socket. Dec 13 14:31:14.914440 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:14.914892 systemd[1]: Listening on docker.socket. Dec 13 14:31:14.915423 systemd[1]: Reached target sockets.target. Dec 13 14:31:14.915865 systemd[1]: Reached target basic.target. Dec 13 14:31:14.916360 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:14.916392 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:31:14.917385 systemd[1]: Starting containerd.service... Dec 13 14:31:14.918834 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Dec 13 14:31:14.923012 systemd[1]: Starting dbus.service... Dec 13 14:31:14.924668 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:31:14.926299 systemd[1]: Starting extend-filesystems.service... Dec 13 14:31:14.927789 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:31:14.936950 systemd[1]: Starting kubelet.service... Dec 13 14:31:14.944689 systemd[1]: Starting motdgen.service... Dec 13 14:31:14.960800 systemd[1]: Starting prepare-helm.service... Dec 13 14:31:14.962473 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:31:14.963923 systemd[1]: Starting sshd-keygen.service... Dec 13 14:31:14.969309 systemd[1]: Starting systemd-logind.service... Dec 13 14:31:14.969890 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:31:14.969949 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:31:14.970485 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:31:14.971245 systemd[1]: Starting update-engine.service... Dec 13 14:31:14.972623 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:31:14.979306 jq[1131]: true Dec 13 14:31:14.987775 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:31:14.995513 jq[1120]: false Dec 13 14:31:14.987959 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:31:14.988295 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:31:14.988445 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:31:14.992657 systemd[1]: Created slice system-sshd.slice. Dec 13 14:31:15.013589 jq[1137]: true Dec 13 14:31:15.021737 tar[1135]: linux-amd64/helm Dec 13 14:31:15.034841 extend-filesystems[1121]: Found loop1 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda1 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda2 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda3 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found usr Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda4 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda6 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda7 Dec 13 14:31:15.036835 extend-filesystems[1121]: Found vda9 Dec 13 14:31:15.036835 extend-filesystems[1121]: Checking size of /dev/vda9 Dec 13 14:31:15.035819 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:31:15.035982 systemd[1]: Finished motdgen.service. Dec 13 14:31:15.086349 extend-filesystems[1121]: Resized partition /dev/vda9 Dec 13 14:31:15.104567 extend-filesystems[1175]: resize2fs 1.46.5 (30-Dec-2021) Dec 13 14:31:15.131026 dbus-daemon[1119]: [system] SELinux support is enabled Dec 13 14:31:15.131233 systemd[1]: Started dbus.service. Dec 13 14:31:15.173023 env[1139]: time="2024-12-13T14:31:15.171564728Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:31:15.133795 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:31:15.133820 systemd[1]: Reached target system-config.target. Dec 13 14:31:15.134336 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:31:15.134357 systemd[1]: Reached target user-config.target. Dec 13 14:31:15.170243 systemd-logind[1129]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:31:15.170268 systemd-logind[1129]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:31:15.176800 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 4635643 blocks Dec 13 14:31:15.179283 systemd-logind[1129]: New seat seat0. Dec 13 14:31:15.181143 systemd[1]: Started systemd-logind.service. Dec 13 14:31:15.190549 update_engine[1130]: I1213 14:31:15.182476 1130 main.cc:92] Flatcar Update Engine starting Dec 13 14:31:15.201449 systemd[1]: Started update-engine.service. Dec 13 14:31:15.205859 update_engine[1130]: I1213 14:31:15.201503 1130 update_check_scheduler.cc:74] Next update check in 7m45s Dec 13 14:31:15.204842 systemd[1]: Started locksmithd.service. Dec 13 14:31:15.236181 env[1139]: time="2024-12-13T14:31:15.236083473Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.312692783Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314185884Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314216251Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314445851Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314469806Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314497047Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314510553Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314593007Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314860509Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315234 env[1139]: time="2024-12-13T14:31:15.314989992Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:31:15.315562 env[1139]: time="2024-12-13T14:31:15.315016732Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:31:15.315562 env[1139]: time="2024-12-13T14:31:15.315071284Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:31:15.315562 env[1139]: time="2024-12-13T14:31:15.315086443Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:31:15.356153 kernel: EXT4-fs (vda9): resized filesystem to 4635643 Dec 13 14:31:15.461730 extend-filesystems[1175]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Dec 13 14:31:15.461730 extend-filesystems[1175]: old_desc_blocks = 1, new_desc_blocks = 3 Dec 13 14:31:15.461730 extend-filesystems[1175]: The filesystem on /dev/vda9 is now 4635643 (4k) blocks long. Dec 13 14:31:15.456912 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473563025Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473670637Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473710642Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473827592Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473872195Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473912331Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473949230Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.473985518Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474020273Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474056140Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474092218Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474206713Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474468794Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:31:15.489426 env[1139]: time="2024-12-13T14:31:15.474676754Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:31:15.497377 extend-filesystems[1121]: Resized filesystem in /dev/vda9 Dec 13 14:31:15.498743 bash[1172]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:31:15.457281 systemd[1]: Finished extend-filesystems.service. Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475350588Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475418435Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475454573Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475584407Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475621757Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475656081Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475689794Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475725080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475770636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475818135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475867087Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.475907092Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.482173605Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.482232034Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.499069 env[1139]: time="2024-12-13T14:31:15.482270747Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.472822 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:31:15.506887 env[1139]: time="2024-12-13T14:31:15.482305262Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:31:15.506887 env[1139]: time="2024-12-13T14:31:15.482345868Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:31:15.506887 env[1139]: time="2024-12-13T14:31:15.482378860Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:31:15.506887 env[1139]: time="2024-12-13T14:31:15.482449712Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:31:15.506887 env[1139]: time="2024-12-13T14:31:15.482550341Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:31:15.492593 systemd[1]: Started containerd.service. Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.483074053Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.485270533Z" level=info msg="Connect containerd service" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.485365681Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491242654Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491371515Z" level=info msg="Start subscribing containerd event" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491458088Z" level=info msg="Start recovering state" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491541083Z" level=info msg="Start event monitor" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491560910Z" level=info msg="Start snapshots syncer" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491573294Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.491582000Z" level=info msg="Start streaming server" Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.492203606Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.492319543Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:31:15.507585 env[1139]: time="2024-12-13T14:31:15.506270398Z" level=info msg="containerd successfully booted in 0.370879s" Dec 13 14:31:15.785059 locksmithd[1189]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:31:15.978929 tar[1135]: linux-amd64/LICENSE Dec 13 14:31:15.978929 tar[1135]: linux-amd64/README.md Dec 13 14:31:15.983397 systemd[1]: Finished prepare-helm.service. Dec 13 14:31:16.860191 sshd_keygen[1153]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:31:16.887702 systemd[1]: Finished sshd-keygen.service. Dec 13 14:31:16.892099 systemd[1]: Starting issuegen.service... Dec 13 14:31:16.895854 systemd[1]: Started sshd@0-172.24.4.208:22-172.24.4.1:34704.service. Dec 13 14:31:16.898437 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:31:16.898612 systemd[1]: Finished issuegen.service. Dec 13 14:31:16.900836 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:31:16.925888 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:31:16.927954 systemd[1]: Started getty@tty1.service. Dec 13 14:31:16.929701 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:31:16.930386 systemd[1]: Reached target getty.target. Dec 13 14:31:18.180207 sshd[1206]: Accepted publickey for core from 172.24.4.1 port 34704 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:18.186293 sshd[1206]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:18.228512 systemd[1]: Created slice user-500.slice. Dec 13 14:31:18.234678 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:31:18.244444 systemd-logind[1129]: New session 1 of user core. Dec 13 14:31:18.255579 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:31:18.259238 systemd[1]: Starting user@500.service... Dec 13 14:31:18.271548 (systemd)[1215]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:18.362372 systemd[1]: Started kubelet.service. Dec 13 14:31:18.437478 systemd[1215]: Queued start job for default target default.target. Dec 13 14:31:18.438660 systemd[1215]: Reached target paths.target. Dec 13 14:31:18.438682 systemd[1215]: Reached target sockets.target. Dec 13 14:31:18.438697 systemd[1215]: Reached target timers.target. Dec 13 14:31:18.438711 systemd[1215]: Reached target basic.target. Dec 13 14:31:18.438761 systemd[1215]: Reached target default.target. Dec 13 14:31:18.438789 systemd[1215]: Startup finished in 153ms. Dec 13 14:31:18.439389 systemd[1]: Started user@500.service. Dec 13 14:31:18.442959 systemd[1]: Started session-1.scope. Dec 13 14:31:18.926781 systemd[1]: Started sshd@1-172.24.4.208:22-172.24.4.1:34712.service. Dec 13 14:31:21.016296 sshd[1232]: Accepted publickey for core from 172.24.4.1 port 34712 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:21.020523 sshd[1232]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:21.034002 systemd[1]: Started session-2.scope. Dec 13 14:31:21.037585 systemd-logind[1129]: New session 2 of user core. Dec 13 14:31:21.251424 kubelet[1223]: E1213 14:31:21.251358 1223 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:21.255350 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:21.255649 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:21.256185 systemd[1]: kubelet.service: Consumed 2.141s CPU time. Dec 13 14:31:21.716411 sshd[1232]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:21.722515 systemd[1]: Started sshd@2-172.24.4.208:22-172.24.4.1:34720.service. Dec 13 14:31:21.726736 systemd[1]: sshd@1-172.24.4.208:22-172.24.4.1:34712.service: Deactivated successfully. Dec 13 14:31:21.728377 systemd[1]: session-2.scope: Deactivated successfully. Dec 13 14:31:21.732675 systemd-logind[1129]: Session 2 logged out. Waiting for processes to exit. Dec 13 14:31:21.735888 systemd-logind[1129]: Removed session 2. Dec 13 14:31:22.076809 coreos-metadata[1116]: Dec 13 14:31:22.076 WARN failed to locate config-drive, using the metadata service API instead Dec 13 14:31:22.161971 coreos-metadata[1116]: Dec 13 14:31:22.161 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 Dec 13 14:31:22.364219 coreos-metadata[1116]: Dec 13 14:31:22.363 INFO Fetch successful Dec 13 14:31:22.364219 coreos-metadata[1116]: Dec 13 14:31:22.363 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 Dec 13 14:31:22.380770 coreos-metadata[1116]: Dec 13 14:31:22.380 INFO Fetch successful Dec 13 14:31:22.386546 unknown[1116]: wrote ssh authorized keys file for user: core Dec 13 14:31:22.615517 update-ssh-keys[1244]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:31:22.616853 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Dec 13 14:31:22.618367 systemd[1]: Reached target multi-user.target. Dec 13 14:31:22.621859 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:31:22.638858 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:31:22.639280 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:31:22.640305 systemd[1]: Startup finished in 972ms (kernel) + 7.504s (initrd) + 15.968s (userspace) = 24.445s. Dec 13 14:31:23.259706 sshd[1239]: Accepted publickey for core from 172.24.4.1 port 34720 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:23.262491 sshd[1239]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:23.273238 systemd-logind[1129]: New session 3 of user core. Dec 13 14:31:23.274736 systemd[1]: Started session-3.scope. Dec 13 14:31:23.791883 sshd[1239]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:23.798365 systemd[1]: sshd@2-172.24.4.208:22-172.24.4.1:34720.service: Deactivated successfully. Dec 13 14:31:23.799918 systemd[1]: session-3.scope: Deactivated successfully. Dec 13 14:31:23.801260 systemd-logind[1129]: Session 3 logged out. Waiting for processes to exit. Dec 13 14:31:23.803249 systemd-logind[1129]: Removed session 3. Dec 13 14:31:31.399269 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:31:31.399564 systemd[1]: Stopped kubelet.service. Dec 13 14:31:31.399617 systemd[1]: kubelet.service: Consumed 2.141s CPU time. Dec 13 14:31:31.401380 systemd[1]: Starting kubelet.service... Dec 13 14:31:31.536197 systemd[1]: Started kubelet.service. Dec 13 14:31:31.997501 kubelet[1253]: E1213 14:31:31.997329 1253 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:32.004394 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:32.004696 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:33.802102 systemd[1]: Started sshd@3-172.24.4.208:22-172.24.4.1:37844.service. Dec 13 14:31:35.380370 sshd[1260]: Accepted publickey for core from 172.24.4.1 port 37844 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:35.383794 sshd[1260]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:35.395941 systemd-logind[1129]: New session 4 of user core. Dec 13 14:31:35.396254 systemd[1]: Started session-4.scope. Dec 13 14:31:36.219956 sshd[1260]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:36.228370 systemd[1]: Started sshd@4-172.24.4.208:22-172.24.4.1:43552.service. Dec 13 14:31:36.229601 systemd[1]: sshd@3-172.24.4.208:22-172.24.4.1:37844.service: Deactivated successfully. Dec 13 14:31:36.232753 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:31:36.235304 systemd-logind[1129]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:31:36.238788 systemd-logind[1129]: Removed session 4. Dec 13 14:31:37.688257 sshd[1265]: Accepted publickey for core from 172.24.4.1 port 43552 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:37.691655 sshd[1265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:37.702388 systemd[1]: Started session-5.scope. Dec 13 14:31:37.703722 systemd-logind[1129]: New session 5 of user core. Dec 13 14:31:38.293558 sshd[1265]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:38.304889 systemd[1]: Started sshd@5-172.24.4.208:22-172.24.4.1:43568.service. Dec 13 14:31:38.313184 systemd[1]: sshd@4-172.24.4.208:22-172.24.4.1:43552.service: Deactivated successfully. Dec 13 14:31:38.317722 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:31:38.320620 systemd-logind[1129]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:31:38.323866 systemd-logind[1129]: Removed session 5. Dec 13 14:31:39.791790 sshd[1271]: Accepted publickey for core from 172.24.4.1 port 43568 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:39.796325 sshd[1271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:39.809481 systemd-logind[1129]: New session 6 of user core. Dec 13 14:31:39.810574 systemd[1]: Started session-6.scope. Dec 13 14:31:40.533333 sshd[1271]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:40.543968 systemd[1]: Started sshd@6-172.24.4.208:22-172.24.4.1:43578.service. Dec 13 14:31:40.545951 systemd[1]: sshd@5-172.24.4.208:22-172.24.4.1:43568.service: Deactivated successfully. Dec 13 14:31:40.548066 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:31:40.563331 systemd-logind[1129]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:31:40.567230 systemd-logind[1129]: Removed session 6. Dec 13 14:31:42.149663 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:31:42.150153 systemd[1]: Stopped kubelet.service. Dec 13 14:31:42.152821 systemd[1]: Starting kubelet.service... Dec 13 14:31:42.160860 sshd[1277]: Accepted publickey for core from 172.24.4.1 port 43578 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:42.165458 sshd[1277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:42.177703 systemd[1]: Started session-7.scope. Dec 13 14:31:42.181522 systemd-logind[1129]: New session 7 of user core. Dec 13 14:31:42.282804 systemd[1]: Started kubelet.service. Dec 13 14:31:42.753370 sudo[1290]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:31:42.753943 sudo[1290]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:42.769510 dbus-daemon[1119]: нM\xf4\xeaU: received setenforce notice (enforcing=1307693904) Dec 13 14:31:42.772205 sudo[1290]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:42.794037 kubelet[1285]: E1213 14:31:42.793807 1285 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:42.798174 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:42.798314 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:42.981849 sshd[1277]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:42.986998 systemd[1]: sshd@6-172.24.4.208:22-172.24.4.1:43578.service: Deactivated successfully. Dec 13 14:31:42.988299 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:31:42.991388 systemd-logind[1129]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:31:42.993959 systemd[1]: Started sshd@7-172.24.4.208:22-172.24.4.1:43582.service. Dec 13 14:31:42.997971 systemd-logind[1129]: Removed session 7. Dec 13 14:31:44.473345 sshd[1295]: Accepted publickey for core from 172.24.4.1 port 43582 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:44.476340 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:44.486648 systemd-logind[1129]: New session 8 of user core. Dec 13 14:31:44.487647 systemd[1]: Started session-8.scope. Dec 13 14:31:45.049957 sudo[1299]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:31:45.050531 sudo[1299]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:45.056757 sudo[1299]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:45.070039 sudo[1298]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:31:45.071274 sudo[1298]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:45.096156 systemd[1]: Stopping audit-rules.service... Dec 13 14:31:45.097000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:31:45.098776 auditctl[1302]: No rules Dec 13 14:31:45.102161 kernel: kauditd_printk_skb: 222 callbacks suppressed Dec 13 14:31:45.102404 kernel: audit: type=1305 audit(1734100305.097:204): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:31:45.100362 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:31:45.100904 systemd[1]: Stopped audit-rules.service. Dec 13 14:31:45.097000 audit[1302]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe35d6b8d0 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.116785 systemd[1]: Starting audit-rules.service... Dec 13 14:31:45.119317 kernel: audit: type=1300 audit(1734100305.097:204): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe35d6b8d0 a2=420 a3=0 items=0 ppid=1 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:45.097000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:31:45.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.132050 kernel: audit: type=1327 audit(1734100305.097:204): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:31:45.132501 kernel: audit: type=1131 audit(1734100305.097:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.158638 augenrules[1319]: No rules Dec 13 14:31:45.160278 systemd[1]: Finished audit-rules.service. Dec 13 14:31:45.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.162409 sudo[1298]: pam_unix(sudo:session): session closed for user root Dec 13 14:31:45.161000 audit[1298]: USER_END pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.181865 kernel: audit: type=1130 audit(1734100305.159:206): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.182018 kernel: audit: type=1106 audit(1734100305.161:207): pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.182095 kernel: audit: type=1104 audit(1734100305.161:208): pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.161000 audit[1298]: CRED_DISP pid=1298 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.320087 sshd[1295]: pam_unix(sshd:session): session closed for user core Dec 13 14:31:45.337387 kernel: audit: type=1106 audit(1734100305.323:209): pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:45.323000 audit[1295]: USER_END pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:45.327966 systemd[1]: sshd@7-172.24.4.208:22-172.24.4.1:43582.service: Deactivated successfully. Dec 13 14:31:45.329318 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:31:45.337746 systemd[1]: Started sshd@8-172.24.4.208:22-172.24.4.1:40256.service. Dec 13 14:31:45.343320 systemd-logind[1129]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:31:45.345894 systemd-logind[1129]: Removed session 8. Dec 13 14:31:45.323000 audit[1295]: CRED_DISP pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:45.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.208:22-172.24.4.1:43582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.365636 kernel: audit: type=1104 audit(1734100305.323:210): pid=1295 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:45.365796 kernel: audit: type=1131 audit(1734100305.324:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.208:22-172.24.4.1:43582 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:45.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.208:22-172.24.4.1:40256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:46.754000 audit[1325]: USER_ACCT pid=1325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:46.756365 sshd[1325]: Accepted publickey for core from 172.24.4.1 port 40256 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:31:46.756000 audit[1325]: CRED_ACQ pid=1325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:46.757000 audit[1325]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdcf381b50 a2=3 a3=0 items=0 ppid=1 pid=1325 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:46.757000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:31:46.759573 sshd[1325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:31:46.771253 systemd-logind[1129]: New session 9 of user core. Dec 13 14:31:46.772261 systemd[1]: Started session-9.scope. Dec 13 14:31:46.786000 audit[1325]: USER_START pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:46.789000 audit[1327]: CRED_ACQ pid=1327 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:31:47.303000 audit[1328]: USER_ACCT pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:47.304592 sudo[1328]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:31:47.303000 audit[1328]: CRED_REFR pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:47.305357 sudo[1328]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:31:47.308000 audit[1328]: USER_START pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:31:47.368562 systemd[1]: Starting docker.service... Dec 13 14:31:47.428828 env[1338]: time="2024-12-13T14:31:47.428785037Z" level=info msg="Starting up" Dec 13 14:31:47.430454 env[1338]: time="2024-12-13T14:31:47.430418273Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:31:47.430454 env[1338]: time="2024-12-13T14:31:47.430443552Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:31:47.430575 env[1338]: time="2024-12-13T14:31:47.430473268Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:31:47.430575 env[1338]: time="2024-12-13T14:31:47.430489810Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:31:47.432145 env[1338]: time="2024-12-13T14:31:47.432091486Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:31:47.432217 env[1338]: time="2024-12-13T14:31:47.432149778Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:31:47.432217 env[1338]: time="2024-12-13T14:31:47.432169755Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:31:47.432217 env[1338]: time="2024-12-13T14:31:47.432184333Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:31:47.510557 env[1338]: time="2024-12-13T14:31:47.510394889Z" level=info msg="Loading containers: start." Dec 13 14:31:47.644000 audit[1368]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.644000 audit[1368]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff31a3e720 a2=0 a3=7fff31a3e70c items=0 ppid=1338 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.644000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:31:47.646000 audit[1370]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1370 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.646000 audit[1370]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd8f947e10 a2=0 a3=7ffd8f947dfc items=0 ppid=1338 pid=1370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.646000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:31:47.649000 audit[1372]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1372 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.649000 audit[1372]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff852a3d30 a2=0 a3=7fff852a3d1c items=0 ppid=1338 pid=1372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:31:47.653000 audit[1374]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.653000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffea79899c0 a2=0 a3=7ffea79899ac items=0 ppid=1338 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.653000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:31:47.658000 audit[1376]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.658000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd70dcd30 a2=0 a3=7fffd70dcd1c items=0 ppid=1338 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.658000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:31:47.679000 audit[1381]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.679000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffce983d40 a2=0 a3=7fffce983d2c items=0 ppid=1338 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:31:47.700000 audit[1383]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.700000 audit[1383]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffffe9e8380 a2=0 a3=7ffffe9e836c items=0 ppid=1338 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:31:47.707000 audit[1385]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.707000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffffb4fc9f0 a2=0 a3=7ffffb4fc9dc items=0 ppid=1338 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.707000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:31:47.712000 audit[1387]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.712000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd4c522360 a2=0 a3=7ffd4c52234c items=0 ppid=1338 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.712000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:31:47.730000 audit[1391]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.730000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd2d7ec3c0 a2=0 a3=7ffd2d7ec3ac items=0 ppid=1338 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.730000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:31:47.736000 audit[1392]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.736000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffed4fc4520 a2=0 a3=7ffed4fc450c items=0 ppid=1338 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.736000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:31:47.768326 kernel: Initializing XFRM netlink socket Dec 13 14:31:47.834485 env[1338]: time="2024-12-13T14:31:47.834405832Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:31:47.872000 audit[1400]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.872000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe176a8e30 a2=0 a3=7ffe176a8e1c items=0 ppid=1338 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.872000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:31:47.883000 audit[1403]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.883000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffde6f06030 a2=0 a3=7ffde6f0601c items=0 ppid=1338 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.883000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:31:47.891000 audit[1406]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.891000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd4baf2bf0 a2=0 a3=7ffd4baf2bdc items=0 ppid=1338 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:31:47.901000 audit[1408]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.901000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef19cb360 a2=0 a3=7ffef19cb34c items=0 ppid=1338 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.901000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:31:47.904000 audit[1410]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1410 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.904000 audit[1410]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff93e0a210 a2=0 a3=7fff93e0a1fc items=0 ppid=1338 pid=1410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.904000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:31:47.909000 audit[1412]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.909000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc016ae070 a2=0 a3=7ffc016ae05c items=0 ppid=1338 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:31:47.913000 audit[1414]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.913000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffca7184650 a2=0 a3=7ffca718463c items=0 ppid=1338 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.913000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:31:47.926000 audit[1417]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.926000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffd6f727dc0 a2=0 a3=7ffd6f727dac items=0 ppid=1338 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:31:47.929000 audit[1419]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.929000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffedde64e0 a2=0 a3=7fffedde64cc items=0 ppid=1338 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.929000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:31:47.932000 audit[1421]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1421 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.932000 audit[1421]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffe4c6ba50 a2=0 a3=7fffe4c6ba3c items=0 ppid=1338 pid=1421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:31:47.934000 audit[1423]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.934000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcdae0c880 a2=0 a3=7ffcdae0c86c items=0 ppid=1338 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:31:47.936166 systemd-networkd[970]: docker0: Link UP Dec 13 14:31:47.955000 audit[1427]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.955000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffef94d10a0 a2=0 a3=7ffef94d108c items=0 ppid=1338 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.955000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:31:47.961000 audit[1428]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:31:47.961000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc1fac4500 a2=0 a3=7ffc1fac44ec items=0 ppid=1338 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:31:47.961000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:31:47.963570 env[1338]: time="2024-12-13T14:31:47.963507673Z" level=info msg="Loading containers: done." Dec 13 14:31:47.979889 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1410282275-merged.mount: Deactivated successfully. Dec 13 14:31:48.012943 env[1338]: time="2024-12-13T14:31:48.012822766Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:31:48.013765 env[1338]: time="2024-12-13T14:31:48.013716560Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:31:48.014234 env[1338]: time="2024-12-13T14:31:48.014185123Z" level=info msg="Daemon has completed initialization" Dec 13 14:31:48.065260 systemd[1]: Started docker.service. Dec 13 14:31:48.064000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:48.086250 env[1338]: time="2024-12-13T14:31:48.086090574Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:31:50.811873 env[1139]: time="2024-12-13T14:31:50.811756246Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:31:51.590501 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2056258358.mount: Deactivated successfully. Dec 13 14:31:52.900095 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:31:52.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.900596 systemd[1]: Stopped kubelet.service. Dec 13 14:31:52.910332 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:31:52.910506 kernel: audit: type=1130 audit(1734100312.899:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.913161 kernel: audit: type=1131 audit(1734100312.899:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:52.916059 systemd[1]: Starting kubelet.service... Dec 13 14:31:53.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:53.037511 systemd[1]: Started kubelet.service. Dec 13 14:31:53.042224 kernel: audit: type=1130 audit(1734100313.036:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:31:53.626239 kubelet[1473]: E1213 14:31:53.626182 1473 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:31:53.640502 kernel: audit: type=1131 audit(1734100313.629:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:31:53.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:31:53.629657 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:31:53.629948 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:31:54.539091 env[1139]: time="2024-12-13T14:31:54.539020983Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.542107 env[1139]: time="2024-12-13T14:31:54.542055417Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.544840 env[1139]: time="2024-12-13T14:31:54.544802095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.548547 env[1139]: time="2024-12-13T14:31:54.548503804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:54.550778 env[1139]: time="2024-12-13T14:31:54.550724324Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:772392d372035bf92e430e758ad0446146d82b7192358c8651252e4fb49c43dd\"" Dec 13 14:31:54.563284 env[1139]: time="2024-12-13T14:31:54.563193156Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:31:58.538692 env[1139]: time="2024-12-13T14:31:58.538540450Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.542382 env[1139]: time="2024-12-13T14:31:58.542324628Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.547469 env[1139]: time="2024-12-13T14:31:58.547364860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.553840 env[1139]: time="2024-12-13T14:31:58.553722255Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:31:58.556029 env[1139]: time="2024-12-13T14:31:58.555958875Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:85333d41dd3ce32d8344280c6d533d4c8f66252e4c28e332a2322ba3837f7bd6\"" Dec 13 14:31:58.579876 env[1139]: time="2024-12-13T14:31:58.579762809Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:32:00.208614 update_engine[1130]: I1213 14:32:00.208441 1130 update_attempter.cc:509] Updating boot flags... Dec 13 14:32:02.002440 env[1139]: time="2024-12-13T14:32:02.002341173Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:02.079547 env[1139]: time="2024-12-13T14:32:02.079458337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:02.130642 env[1139]: time="2024-12-13T14:32:02.130532393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:02.178459 env[1139]: time="2024-12-13T14:32:02.178368199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:02.181139 env[1139]: time="2024-12-13T14:32:02.181017309Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:eb53b988d5e03f329b5fdba21cbbbae48e1619b199689e7448095b31843b2c43\"" Dec 13 14:32:02.203682 env[1139]: time="2024-12-13T14:32:02.203614126Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:32:03.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:03.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:03.649863 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:32:03.650485 systemd[1]: Stopped kubelet.service. Dec 13 14:32:03.653487 systemd[1]: Starting kubelet.service... Dec 13 14:32:03.658236 kernel: audit: type=1130 audit(1734100323.649:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:03.658397 kernel: audit: type=1131 audit(1734100323.649:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:03.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:03.776027 systemd[1]: Started kubelet.service. Dec 13 14:32:03.780477 kernel: audit: type=1130 audit(1734100323.775:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:04.250838 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3138691230.mount: Deactivated successfully. Dec 13 14:32:04.342459 kubelet[1513]: E1213 14:32:04.342364 1513 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:04.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:04.346722 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:04.347010 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:04.352194 kernel: audit: type=1131 audit(1734100324.346:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:05.311573 env[1139]: time="2024-12-13T14:32:05.311500514Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:05.327918 env[1139]: time="2024-12-13T14:32:05.327796401Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:05.435220 env[1139]: time="2024-12-13T14:32:05.435083936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:05.452733 env[1139]: time="2024-12-13T14:32:05.452618570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:05.454614 env[1139]: time="2024-12-13T14:32:05.454521959Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:ce61fda67eb41cf09d2b984e7979e289b5042e3983ddfc67be678425632cc0d2\"" Dec 13 14:32:05.474822 env[1139]: time="2024-12-13T14:32:05.474754841Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:32:07.249222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3170173446.mount: Deactivated successfully. Dec 13 14:32:09.946775 env[1139]: time="2024-12-13T14:32:09.946617219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:09.958196 env[1139]: time="2024-12-13T14:32:09.958058427Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:09.963784 env[1139]: time="2024-12-13T14:32:09.963716002Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:09.970485 env[1139]: time="2024-12-13T14:32:09.970380504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:09.973376 env[1139]: time="2024-12-13T14:32:09.973296064Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:32:09.999824 env[1139]: time="2024-12-13T14:32:09.999720130Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:32:10.667872 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1220453118.mount: Deactivated successfully. Dec 13 14:32:10.680722 env[1139]: time="2024-12-13T14:32:10.680630223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:10.683742 env[1139]: time="2024-12-13T14:32:10.683667483Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:10.687099 env[1139]: time="2024-12-13T14:32:10.687033059Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:10.691151 env[1139]: time="2024-12-13T14:32:10.690962738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:10.692992 env[1139]: time="2024-12-13T14:32:10.692910877Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 14:32:10.716874 env[1139]: time="2024-12-13T14:32:10.716795657Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:32:11.383920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3758447106.mount: Deactivated successfully. Dec 13 14:32:14.399045 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:32:14.399316 systemd[1]: Stopped kubelet.service. Dec 13 14:32:14.411944 kernel: audit: type=1130 audit(1734100334.398:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.401220 systemd[1]: Starting kubelet.service... Dec 13 14:32:14.398000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.424182 kernel: audit: type=1131 audit(1734100334.398:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.544798 systemd[1]: Started kubelet.service. Dec 13 14:32:14.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.549144 kernel: audit: type=1130 audit(1734100334.543:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:14.606614 kubelet[1541]: E1213 14:32:14.606579 1541 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:32:14.608362 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:32:14.608495 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:32:14.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:14.613156 kernel: audit: type=1131 audit(1734100334.607:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:16.946232 env[1139]: time="2024-12-13T14:32:16.946056108Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.954461 env[1139]: time="2024-12-13T14:32:16.954386192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.967602 env[1139]: time="2024-12-13T14:32:16.967523807Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.969800 env[1139]: time="2024-12-13T14:32:16.969754001Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:16.971493 env[1139]: time="2024-12-13T14:32:16.971432046Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" Dec 13 14:32:22.377293 systemd[1]: Stopped kubelet.service. Dec 13 14:32:22.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.379735 systemd[1]: Starting kubelet.service... Dec 13 14:32:22.388201 kernel: audit: type=1130 audit(1734100342.376:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.396182 kernel: audit: type=1131 audit(1734100342.376:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:22.419535 systemd[1]: Reloading. Dec 13 14:32:22.521030 /usr/lib/systemd/system-generators/torcx-generator[1639]: time="2024-12-13T14:32:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:22.521061 /usr/lib/systemd/system-generators/torcx-generator[1639]: time="2024-12-13T14:32:22Z" level=info msg="torcx already run" Dec 13 14:32:22.629706 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:22.629726 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:22.654105 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.741182 kernel: audit: type=1400 audit(1734100342.724:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.741403 kernel: audit: type=1400 audit(1734100342.724:261): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.744019 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:32:22.745780 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:32:22.745866 kernel: audit: backlog limit exceeded Dec 13 14:32:22.747726 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:32:22.747820 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:32:22.748911 kernel: audit: backlog limit exceeded Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit: BPF prog-id=43 op=LOAD Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.732000 audit: BPF prog-id=44 op=LOAD Dec 13 14:32:22.732000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:32:22.732000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit: BPF prog-id=45 op=LOAD Dec 13 14:32:22.740000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit: BPF prog-id=46 op=LOAD Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.740000 audit: BPF prog-id=47 op=LOAD Dec 13 14:32:22.740000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:32:22.740000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.742000 audit: BPF prog-id=48 op=LOAD Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.750000 audit: BPF prog-id=51 op=LOAD Dec 13 14:32:22.750000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit: BPF prog-id=52 op=LOAD Dec 13 14:32:22.751000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit: BPF prog-id=53 op=LOAD Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.751000 audit: BPF prog-id=54 op=LOAD Dec 13 14:32:22.751000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:32:22.751000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.752000 audit: BPF prog-id=55 op=LOAD Dec 13 14:32:22.752000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.753000 audit: BPF prog-id=56 op=LOAD Dec 13 14:32:22.753000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:22.754000 audit: BPF prog-id=57 op=LOAD Dec 13 14:32:22.754000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:32:22.788058 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:32:22.788157 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:32:22.787000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:32:22.788360 systemd[1]: Stopped kubelet.service. Dec 13 14:32:22.790030 systemd[1]: Starting kubelet.service... Dec 13 14:32:23.044343 systemd[1]: Started kubelet.service. Dec 13 14:32:23.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:23.675652 kubelet[1689]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:23.675968 kubelet[1689]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:32:23.676019 kubelet[1689]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:23.678059 kubelet[1689]: I1213 14:32:23.678028 1689 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:32:24.031878 kubelet[1689]: I1213 14:32:24.030969 1689 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:32:24.031878 kubelet[1689]: I1213 14:32:24.031002 1689 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:32:24.031878 kubelet[1689]: I1213 14:32:24.031263 1689 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:32:24.076627 kubelet[1689]: I1213 14:32:24.075958 1689 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:32:24.079077 kubelet[1689]: E1213 14:32:24.078933 1689 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.208:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.123070 kubelet[1689]: I1213 14:32:24.123026 1689 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:32:24.134663 kubelet[1689]: I1213 14:32:24.134605 1689 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:32:24.135889 kubelet[1689]: I1213 14:32:24.134956 1689 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-7-e74dd619d7.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:32:24.136225 kubelet[1689]: I1213 14:32:24.136199 1689 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:32:24.136372 kubelet[1689]: I1213 14:32:24.136354 1689 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:32:24.136779 kubelet[1689]: I1213 14:32:24.136653 1689 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:24.142575 kubelet[1689]: I1213 14:32:24.142551 1689 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:32:24.142732 kubelet[1689]: I1213 14:32:24.142713 1689 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:32:24.142898 kubelet[1689]: I1213 14:32:24.142879 1689 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:32:24.143032 kubelet[1689]: I1213 14:32:24.143012 1689 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:32:24.143959 kubelet[1689]: W1213 14:32:24.143858 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.144063 kubelet[1689]: E1213 14:32:24.143996 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.159314 kubelet[1689]: W1213 14:32:24.159179 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.159665 kubelet[1689]: E1213 14:32:24.159637 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.159991 kubelet[1689]: I1213 14:32:24.159956 1689 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:32:24.193609 kubelet[1689]: I1213 14:32:24.193560 1689 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:32:24.194027 kubelet[1689]: W1213 14:32:24.193937 1689 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:32:24.195618 kubelet[1689]: I1213 14:32:24.195564 1689 server.go:1264] "Started kubelet" Dec 13 14:32:24.347000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:24.347000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:24.347000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bdfcb0 a1=c0008c1758 a2=c000bdfc80 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.347000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:24.350425 kubelet[1689]: I1213 14:32:24.350356 1689 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:32:24.349000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:24.349000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:24.349000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006bd1e0 a1=c0008c1770 a2=c000bdfd40 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.349000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:24.351375 kubelet[1689]: I1213 14:32:24.351338 1689 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:32:24.351700 kubelet[1689]: I1213 14:32:24.351671 1689 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:32:24.356000 audit[1700]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.356000 audit[1700]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc29fe27e0 a2=0 a3=7ffc29fe27cc items=0 ppid=1689 pid=1700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:32:24.358000 audit[1701]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.358000 audit[1701]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6884ab90 a2=0 a3=7ffc6884ab7c items=0 ppid=1689 pid=1701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.358000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:32:24.362398 kubelet[1689]: I1213 14:32:24.362312 1689 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:32:24.364572 kubelet[1689]: I1213 14:32:24.364525 1689 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:32:24.366624 kubelet[1689]: I1213 14:32:24.366524 1689 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:32:24.366958 kubelet[1689]: I1213 14:32:24.366912 1689 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:32:24.586319 kubelet[1689]: I1213 14:32:24.586253 1689 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:32:24.588000 audit[1703]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.588000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd06a1f830 a2=0 a3=7ffd06a1f81c items=0 ppid=1689 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.588000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:24.594479 kubelet[1689]: I1213 14:32:24.594421 1689 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:32:24.594624 kubelet[1689]: I1213 14:32:24.594554 1689 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:32:24.595000 audit[1705]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.595000 audit[1705]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdcba743e0 a2=0 a3=7ffdcba743cc items=0 ppid=1689 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.595000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:24.608935 kubelet[1689]: E1213 14:32:24.608856 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.208:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7-e74dd619d7.novalocal?timeout=10s\": dial tcp 172.24.4.208:6443: connect: connection refused" interval="200ms" Dec 13 14:32:24.611454 kubelet[1689]: E1213 14:32:24.610336 1689 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.208:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.208:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-6-7-e74dd619d7.novalocal.1810c3134ca7dce0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-6-7-e74dd619d7.novalocal,UID:ci-3510-3-6-7-e74dd619d7.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-6-7-e74dd619d7.novalocal,},FirstTimestamp:2024-12-13 14:32:24.195505376 +0000 UTC m=+1.141829475,LastTimestamp:2024-12-13 14:32:24.195505376 +0000 UTC m=+1.141829475,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-6-7-e74dd619d7.novalocal,}" Dec 13 14:32:24.612067 kubelet[1689]: W1213 14:32:24.611802 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.208:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.612067 kubelet[1689]: E1213 14:32:24.611983 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.208:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.613694 kubelet[1689]: I1213 14:32:24.613591 1689 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:32:24.616950 kubelet[1689]: E1213 14:32:24.616895 1689 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:32:24.617209 kubelet[1689]: I1213 14:32:24.617173 1689 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:32:24.618325 kubelet[1689]: I1213 14:32:24.618272 1689 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:32:24.646000 audit[1711]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.646000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff270ebca0 a2=0 a3=7fff270ebc8c items=0 ppid=1689 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.646000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:32:24.649215 kubelet[1689]: I1213 14:32:24.649029 1689 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:32:24.650000 audit[1713]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:24.650000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd147fa690 a2=0 a3=7ffd147fa67c items=0 ppid=1689 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:32:24.652730 kubelet[1689]: I1213 14:32:24.652679 1689 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:32:24.653359 kubelet[1689]: I1213 14:32:24.653302 1689 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:32:24.653620 kubelet[1689]: I1213 14:32:24.653571 1689 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:32:24.653930 kubelet[1689]: E1213 14:32:24.653873 1689 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:32:24.654000 audit[1714]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.654000 audit[1714]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc5643ad30 a2=0 a3=7ffc5643ad1c items=0 ppid=1689 pid=1714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:32:24.659097 kubelet[1689]: W1213 14:32:24.658987 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.208:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.659473 kubelet[1689]: E1213 14:32:24.659442 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.208:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:24.658000 audit[1715]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:24.658000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd0142af0 a2=0 a3=7ffcd0142adc items=0 ppid=1689 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.658000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:32:24.661000 audit[1716]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.661000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcef46a1b0 a2=0 a3=7ffcef46a19c items=0 ppid=1689 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.661000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:32:24.666000 audit[1717]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:24.666000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc39f4aaa0 a2=0 a3=7ffc39f4aa8c items=0 ppid=1689 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.666000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:32:24.669706 kubelet[1689]: I1213 14:32:24.669653 1689 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:32:24.669706 kubelet[1689]: I1213 14:32:24.669699 1689 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:32:24.669935 kubelet[1689]: I1213 14:32:24.669751 1689 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:24.672000 audit[1719]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:24.672000 audit[1719]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe4d486fa0 a2=0 a3=7ffe4d486f8c items=0 ppid=1689 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.672000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:32:24.675000 audit[1718]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:24.675000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe993955e0 a2=0 a3=7ffe993955cc items=0 ppid=1689 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.675000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:32:24.689094 kubelet[1689]: I1213 14:32:24.689057 1689 policy_none.go:49] "None policy: Start" Dec 13 14:32:24.691598 kubelet[1689]: I1213 14:32:24.691552 1689 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.692521 kubelet[1689]: I1213 14:32:24.692465 1689 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:32:24.692521 kubelet[1689]: I1213 14:32:24.692514 1689 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:32:24.693456 kubelet[1689]: E1213 14:32:24.693390 1689 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.208:6443/api/v1/nodes\": dial tcp 172.24.4.208:6443: connect: connection refused" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.703907 systemd[1]: Created slice kubepods.slice. Dec 13 14:32:24.717619 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:32:24.725849 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:32:24.735509 kubelet[1689]: I1213 14:32:24.735433 1689 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:32:24.734000 audit[1689]: AVC avc: denied { mac_admin } for pid=1689 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:24.734000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:24.734000 audit[1689]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000eb11a0 a1=c000ea9f98 a2=c000eb1170 a3=25 items=0 ppid=1 pid=1689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:24.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:24.736360 kubelet[1689]: I1213 14:32:24.735623 1689 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:32:24.736360 kubelet[1689]: I1213 14:32:24.735859 1689 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:32:24.736360 kubelet[1689]: I1213 14:32:24.736090 1689 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:32:24.743164 kubelet[1689]: E1213 14:32:24.743084 1689 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:24.754648 kubelet[1689]: I1213 14:32:24.754552 1689 topology_manager.go:215] "Topology Admit Handler" podUID="1c7399f89869015211aef91dfa465a12" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.757508 kubelet[1689]: I1213 14:32:24.757472 1689 topology_manager.go:215] "Topology Admit Handler" podUID="1bf43a535657f3947c9bddc26fe253aa" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.759090 kubelet[1689]: I1213 14:32:24.759067 1689 topology_manager.go:215] "Topology Admit Handler" podUID="80661cc7a67d7481552c4513b9af44b7" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.768380 systemd[1]: Created slice kubepods-burstable-pod1c7399f89869015211aef91dfa465a12.slice. Dec 13 14:32:24.783203 systemd[1]: Created slice kubepods-burstable-pod1bf43a535657f3947c9bddc26fe253aa.slice. Dec 13 14:32:24.795952 systemd[1]: Created slice kubepods-burstable-pod80661cc7a67d7481552c4513b9af44b7.slice. Dec 13 14:32:24.810687 kubelet[1689]: E1213 14:32:24.810406 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.208:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7-e74dd619d7.novalocal?timeout=10s\": dial tcp 172.24.4.208:6443: connect: connection refused" interval="400ms" Dec 13 14:32:24.898781 kubelet[1689]: I1213 14:32:24.895470 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899024 kubelet[1689]: I1213 14:32:24.898984 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899177 kubelet[1689]: I1213 14:32:24.899155 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80661cc7a67d7481552c4513b9af44b7-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"80661cc7a67d7481552c4513b9af44b7\") " pod="kube-system/kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899299 kubelet[1689]: I1213 14:32:24.899282 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899399 kubelet[1689]: I1213 14:32:24.899381 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899494 kubelet[1689]: I1213 14:32:24.899479 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899588 kubelet[1689]: I1213 14:32:24.899572 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899702 kubelet[1689]: I1213 14:32:24.899685 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.899798 kubelet[1689]: I1213 14:32:24.899782 1689 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.900028 kubelet[1689]: I1213 14:32:24.898034 1689 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:24.900796 kubelet[1689]: E1213 14:32:24.900704 1689 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.208:6443/api/v1/nodes\": dial tcp 172.24.4.208:6443: connect: connection refused" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:25.054500 kubelet[1689]: W1213 14:32:25.054383 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.054895 kubelet[1689]: E1213 14:32:25.054867 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.080788 env[1139]: time="2024-12-13T14:32:25.080651204Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:1c7399f89869015211aef91dfa465a12,Namespace:kube-system,Attempt:0,}" Dec 13 14:32:25.095322 env[1139]: time="2024-12-13T14:32:25.095189721Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:1bf43a535657f3947c9bddc26fe253aa,Namespace:kube-system,Attempt:0,}" Dec 13 14:32:25.106829 env[1139]: time="2024-12-13T14:32:25.106661148Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:80661cc7a67d7481552c4513b9af44b7,Namespace:kube-system,Attempt:0,}" Dec 13 14:32:25.213226 kubelet[1689]: E1213 14:32:25.211651 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.208:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7-e74dd619d7.novalocal?timeout=10s\": dial tcp 172.24.4.208:6443: connect: connection refused" interval="800ms" Dec 13 14:32:25.237735 kubelet[1689]: W1213 14:32:25.237519 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.237735 kubelet[1689]: E1213 14:32:25.237648 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.304675 kubelet[1689]: I1213 14:32:25.304599 1689 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:25.305393 kubelet[1689]: E1213 14:32:25.305340 1689 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.208:6443/api/v1/nodes\": dial tcp 172.24.4.208:6443: connect: connection refused" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:25.620739 kubelet[1689]: W1213 14:32:25.620486 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.208:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.620739 kubelet[1689]: E1213 14:32:25.620608 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.208:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.843250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1455414706.mount: Deactivated successfully. Dec 13 14:32:25.886638 kubelet[1689]: W1213 14:32:25.886367 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.208:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.886638 kubelet[1689]: E1213 14:32:25.886485 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.208:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:25.909598 env[1139]: time="2024-12-13T14:32:25.909226826Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.922084 env[1139]: time="2024-12-13T14:32:25.921990731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.924334 env[1139]: time="2024-12-13T14:32:25.924281493Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.932786 env[1139]: time="2024-12-13T14:32:25.932722709Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.946020 env[1139]: time="2024-12-13T14:32:25.945907353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.952377 env[1139]: time="2024-12-13T14:32:25.952282667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.962186 env[1139]: time="2024-12-13T14:32:25.962038242Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.968399 env[1139]: time="2024-12-13T14:32:25.968304191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.971682 env[1139]: time="2024-12-13T14:32:25.971608807Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.979913 env[1139]: time="2024-12-13T14:32:25.979806746Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.987860 env[1139]: time="2024-12-13T14:32:25.987775734Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:25.998020 env[1139]: time="2024-12-13T14:32:25.997926079Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:26.013046 kubelet[1689]: E1213 14:32:26.012932 1689 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.208:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-6-7-e74dd619d7.novalocal?timeout=10s\": dial tcp 172.24.4.208:6443: connect: connection refused" interval="1.6s" Dec 13 14:32:26.107781 kubelet[1689]: I1213 14:32:26.107441 1689 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:26.107781 kubelet[1689]: E1213 14:32:26.107739 1689 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.208:6443/api/v1/nodes\": dial tcp 172.24.4.208:6443: connect: connection refused" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:26.110161 env[1139]: time="2024-12-13T14:32:26.109920838Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:26.110553 env[1139]: time="2024-12-13T14:32:26.110099544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:26.110553 env[1139]: time="2024-12-13T14:32:26.110173673Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:26.110553 env[1139]: time="2024-12-13T14:32:26.110439382Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f642ec44d8f14bfcd21190a6baf864d75f096e18f39773d5bf63dd79fc14821 pid=1728 runtime=io.containerd.runc.v2 Dec 13 14:32:26.128188 env[1139]: time="2024-12-13T14:32:26.128043214Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:26.128369 env[1139]: time="2024-12-13T14:32:26.128185421Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:26.128369 env[1139]: time="2024-12-13T14:32:26.128216990Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:26.128547 env[1139]: time="2024-12-13T14:32:26.128471288Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ac0b679713b7d4b178e4e953746096749565fe92b59b90e16c57a6d1c717e75 pid=1752 runtime=io.containerd.runc.v2 Dec 13 14:32:26.131535 env[1139]: time="2024-12-13T14:32:26.131447348Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:26.131724 env[1139]: time="2024-12-13T14:32:26.131511979Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:26.131724 env[1139]: time="2024-12-13T14:32:26.131529632Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:26.131867 env[1139]: time="2024-12-13T14:32:26.131793388Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f116e82ef8b3b7877019c1c4ad78256f40345517a9950ee9e0c87c2fcced06fa pid=1746 runtime=io.containerd.runc.v2 Dec 13 14:32:26.147300 systemd[1]: Started cri-containerd-6f642ec44d8f14bfcd21190a6baf864d75f096e18f39773d5bf63dd79fc14821.scope. Dec 13 14:32:26.167466 systemd[1]: Started cri-containerd-f116e82ef8b3b7877019c1c4ad78256f40345517a9950ee9e0c87c2fcced06fa.scope. Dec 13 14:32:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit: BPF prog-id=58 op=LOAD Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1728 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363432656334346438663134626663643231313930613662616638 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1728 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363432656334346438663134626663643231313930613662616638 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.174000 audit: BPF prog-id=59 op=LOAD Dec 13 14:32:26.174000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002e61b0 items=0 ppid=1728 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363432656334346438663134626663643231313930613662616638 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.175000 audit: BPF prog-id=60 op=LOAD Dec 13 14:32:26.175000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002e61f8 items=0 ppid=1728 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.175000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363432656334346438663134626663643231313930613662616638 Dec 13 14:32:26.176000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:32:26.176000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { perfmon } for pid=1757 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit[1757]: AVC avc: denied { bpf } for pid=1757 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.176000 audit: BPF prog-id=61 op=LOAD Dec 13 14:32:26.176000 audit[1757]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002e6608 items=0 ppid=1728 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666363432656334346438663134626663643231313930613662616638 Dec 13 14:32:26.189150 systemd[1]: Started cri-containerd-0ac0b679713b7d4b178e4e953746096749565fe92b59b90e16c57a6d1c717e75.scope. Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.205000 audit: BPF prog-id=62 op=LOAD Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1746 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313665383265663862336237383737303139633163346164373832 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1746 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313665383265663862336237383737303139633163346164373832 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit: BPF prog-id=63 op=LOAD Dec 13 14:32:26.207000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001a9ce0 items=0 ppid=1746 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313665383265663862336237383737303139633163346164373832 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit: BPF prog-id=64 op=LOAD Dec 13 14:32:26.207000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001a9d28 items=0 ppid=1746 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313665383265663862336237383737303139633163346164373832 Dec 13 14:32:26.207000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:32:26.207000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { perfmon } for pid=1778 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit[1778]: AVC avc: denied { bpf } for pid=1778 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.207000 audit: BPF prog-id=65 op=LOAD Dec 13 14:32:26.207000 audit[1778]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000424138 items=0 ppid=1746 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313665383265663862336237383737303139633163346164373832 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.212000 audit: BPF prog-id=66 op=LOAD Dec 13 14:32:26.213000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.213000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633062363739373133623764346231373865346539353337343630 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633062363739373133623764346231373865346539353337343630 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.214000 audit: BPF prog-id=67 op=LOAD Dec 13 14:32:26.214000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c000288f10 items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633062363739373133623764346231373865346539353337343630 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.215000 audit: BPF prog-id=68 op=LOAD Dec 13 14:32:26.215000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000288f58 items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.215000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633062363739373133623764346231373865346539353337343630 Dec 13 14:32:26.216000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:32:26.216000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { perfmon } for pid=1777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit[1777]: AVC avc: denied { bpf } for pid=1777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.216000 audit: BPF prog-id=69 op=LOAD Dec 13 14:32:26.216000 audit[1777]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c000289368 items=0 ppid=1752 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.216000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061633062363739373133623764346231373865346539353337343630 Dec 13 14:32:26.248099 env[1139]: time="2024-12-13T14:32:26.248056603Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:1bf43a535657f3947c9bddc26fe253aa,Namespace:kube-system,Attempt:0,} returns sandbox id \"6f642ec44d8f14bfcd21190a6baf864d75f096e18f39773d5bf63dd79fc14821\"" Dec 13 14:32:26.255738 env[1139]: time="2024-12-13T14:32:26.255674280Z" level=info msg="CreateContainer within sandbox \"6f642ec44d8f14bfcd21190a6baf864d75f096e18f39773d5bf63dd79fc14821\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:32:26.258528 kubelet[1689]: E1213 14:32:26.258479 1689 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.208:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:26.273446 env[1139]: time="2024-12-13T14:32:26.273407145Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:80661cc7a67d7481552c4513b9af44b7,Namespace:kube-system,Attempt:0,} returns sandbox id \"f116e82ef8b3b7877019c1c4ad78256f40345517a9950ee9e0c87c2fcced06fa\"" Dec 13 14:32:26.277178 env[1139]: time="2024-12-13T14:32:26.277145565Z" level=info msg="CreateContainer within sandbox \"f116e82ef8b3b7877019c1c4ad78256f40345517a9950ee9e0c87c2fcced06fa\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:32:26.280046 env[1139]: time="2024-12-13T14:32:26.279987723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal,Uid:1c7399f89869015211aef91dfa465a12,Namespace:kube-system,Attempt:0,} returns sandbox id \"0ac0b679713b7d4b178e4e953746096749565fe92b59b90e16c57a6d1c717e75\"" Dec 13 14:32:26.284632 env[1139]: time="2024-12-13T14:32:26.284577393Z" level=info msg="CreateContainer within sandbox \"0ac0b679713b7d4b178e4e953746096749565fe92b59b90e16c57a6d1c717e75\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:32:26.333322 env[1139]: time="2024-12-13T14:32:26.333274692Z" level=info msg="CreateContainer within sandbox \"6f642ec44d8f14bfcd21190a6baf864d75f096e18f39773d5bf63dd79fc14821\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"32daa7f37df73e614575c86d23cc362449ae44d1b8c0750f32980db255148efb\"" Dec 13 14:32:26.334264 env[1139]: time="2024-12-13T14:32:26.334237801Z" level=info msg="StartContainer for \"32daa7f37df73e614575c86d23cc362449ae44d1b8c0750f32980db255148efb\"" Dec 13 14:32:26.355306 systemd[1]: Started cri-containerd-32daa7f37df73e614575c86d23cc362449ae44d1b8c0750f32980db255148efb.scope. Dec 13 14:32:26.360380 env[1139]: time="2024-12-13T14:32:26.360299448Z" level=info msg="CreateContainer within sandbox \"f116e82ef8b3b7877019c1c4ad78256f40345517a9950ee9e0c87c2fcced06fa\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d8fa096d7ab50e496db148f4ee3913996ba21548138455731577a095d8c8449f\"" Dec 13 14:32:26.361044 env[1139]: time="2024-12-13T14:32:26.361013028Z" level=info msg="StartContainer for \"d8fa096d7ab50e496db148f4ee3913996ba21548138455731577a095d8c8449f\"" Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.373000 audit: BPF prog-id=70 op=LOAD Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646161376633376466373365363134353735633836643233636333 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646161376633376466373365363134353735633836643233636333 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit: BPF prog-id=71 op=LOAD Dec 13 14:32:26.374000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000303680 items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646161376633376466373365363134353735633836643233636333 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit: BPF prog-id=72 op=LOAD Dec 13 14:32:26.374000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003036c8 items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646161376633376466373365363134353735633836643233636333 Dec 13 14:32:26.374000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:32:26.374000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { perfmon } for pid=1855 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit[1855]: AVC avc: denied { bpf } for pid=1855 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.374000 audit: BPF prog-id=73 op=LOAD Dec 13 14:32:26.374000 audit[1855]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000303ad8 items=0 ppid=1728 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332646161376633376466373365363134353735633836643233636333 Dec 13 14:32:26.383470 env[1139]: time="2024-12-13T14:32:26.383378112Z" level=info msg="CreateContainer within sandbox \"0ac0b679713b7d4b178e4e953746096749565fe92b59b90e16c57a6d1c717e75\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"cd70995b48bb334ee7a4e81fa4eb5a5ec412a69ac3d4027dbae6e45e907305e7\"" Dec 13 14:32:26.384608 env[1139]: time="2024-12-13T14:32:26.384537669Z" level=info msg="StartContainer for \"cd70995b48bb334ee7a4e81fa4eb5a5ec412a69ac3d4027dbae6e45e907305e7\"" Dec 13 14:32:26.418427 systemd[1]: Started cri-containerd-cd70995b48bb334ee7a4e81fa4eb5a5ec412a69ac3d4027dbae6e45e907305e7.scope. Dec 13 14:32:26.419173 systemd[1]: Started cri-containerd-d8fa096d7ab50e496db148f4ee3913996ba21548138455731577a095d8c8449f.scope. Dec 13 14:32:26.443400 env[1139]: time="2024-12-13T14:32:26.443321953Z" level=info msg="StartContainer for \"32daa7f37df73e614575c86d23cc362449ae44d1b8c0750f32980db255148efb\" returns successfully" Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.453000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.454000 audit: BPF prog-id=74 op=LOAD Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1752 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373039393562343862623333346565376134653831666134656235 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1752 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373039393562343862623333346565376134653831666134656235 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.455000 audit: BPF prog-id=75 op=LOAD Dec 13 14:32:26.455000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c72d0 items=0 ppid=1752 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373039393562343862623333346565376134653831666134656235 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.457000 audit: BPF prog-id=76 op=LOAD Dec 13 14:32:26.457000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c7318 items=0 ppid=1752 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373039393562343862623333346565376134653831666134656235 Dec 13 14:32:26.458000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:32:26.458000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { perfmon } for pid=1894 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.459000 audit: BPF prog-id=77 op=LOAD Dec 13 14:32:26.458000 audit[1894]: AVC avc: denied { bpf } for pid=1894 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.458000 audit: BPF prog-id=78 op=LOAD Dec 13 14:32:26.458000 audit[1894]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7728 items=0 ppid=1752 pid=1894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.458000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6364373039393562343862623333346565376134653831666134656235 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=1746 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666130393664376162353065343936646231343866346565333931 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=1746 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666130393664376162353065343936646231343866346565333931 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit: BPF prog-id=79 op=LOAD Dec 13 14:32:26.461000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000024b80 items=0 ppid=1746 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666130393664376162353065343936646231343866346565333931 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit: BPF prog-id=80 op=LOAD Dec 13 14:32:26.461000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000024bc8 items=0 ppid=1746 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666130393664376162353065343936646231343866346565333931 Dec 13 14:32:26.461000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:32:26.461000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:26.461000 audit: BPF prog-id=81 op=LOAD Dec 13 14:32:26.461000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000024fd8 items=0 ppid=1746 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:26.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438666130393664376162353065343936646231343866346565333931 Dec 13 14:32:26.525838 env[1139]: time="2024-12-13T14:32:26.525774108Z" level=info msg="StartContainer for \"cd70995b48bb334ee7a4e81fa4eb5a5ec412a69ac3d4027dbae6e45e907305e7\" returns successfully" Dec 13 14:32:26.527226 env[1139]: time="2024-12-13T14:32:26.527202591Z" level=info msg="StartContainer for \"d8fa096d7ab50e496db148f4ee3913996ba21548138455731577a095d8c8449f\" returns successfully" Dec 13 14:32:26.938464 kubelet[1689]: W1213 14:32:26.938328 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:26.939280 kubelet[1689]: E1213 14:32:26.939255 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.208:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:26.995497 kubelet[1689]: W1213 14:32:26.995454 1689 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:26.995710 kubelet[1689]: E1213 14:32:26.995697 1689 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.208:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-6-7-e74dd619d7.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.208:6443: connect: connection refused Dec 13 14:32:27.709438 kubelet[1689]: I1213 14:32:27.709399 1689 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:28.127186 kernel: kauditd_printk_skb: 602 callbacks suppressed Dec 13 14:32:28.127434 kernel: audit: type=1400 audit(1734100348.122:534): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:28.122000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:28.122000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:28.134262 kernel: audit: type=1400 audit(1734100348.122:535): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:28.122000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f087c0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:28.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:28.146047 kernel: audit: type=1300 audit(1734100348.122:535): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000f087c0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:28.146151 kernel: audit: type=1327 audit(1734100348.122:535): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:28.122000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ade000 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:28.152163 kernel: audit: type=1300 audit(1734100348.122:534): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ade000 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:28.122000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:28.158667 kernel: audit: type=1327 audit(1734100348.122:534): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:29.014000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.020217 kernel: audit: type=1400 audit(1734100349.014:536): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.020297 kernel: audit: type=1300 audit(1734100349.014:536): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0066c8210 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.014000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c0066c8210 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.031866 kernel: audit: type=1327 audit(1734100349.014:536): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.031950 kernel: audit: type=1400 audit(1734100349.014:537): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.014000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.014000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006fe8880 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.014000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.023000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.023000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c0066c86c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.023000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.025000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.025000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0066c89f0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.079000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.079000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c0032d4940 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.079000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:29.079000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=84 a1=c006df0360 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:32:29.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:32:29.178495 kubelet[1689]: E1213 14:32:29.178390 1689 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:29.221009 kubelet[1689]: I1213 14:32:29.220952 1689 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:29.235680 kubelet[1689]: E1213 14:32:29.235647 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.336792 kubelet[1689]: E1213 14:32:29.336615 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.437584 kubelet[1689]: E1213 14:32:29.437486 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.538533 kubelet[1689]: E1213 14:32:29.538387 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.639843 kubelet[1689]: E1213 14:32:29.639618 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.740572 kubelet[1689]: E1213 14:32:29.740498 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.840817 kubelet[1689]: E1213 14:32:29.840646 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:29.941786 kubelet[1689]: E1213 14:32:29.941722 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.043057 kubelet[1689]: E1213 14:32:30.042972 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.144025 kubelet[1689]: E1213 14:32:30.143962 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.245160 kubelet[1689]: E1213 14:32:30.244943 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.346957 kubelet[1689]: E1213 14:32:30.346836 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.447808 kubelet[1689]: E1213 14:32:30.447719 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.548925 kubelet[1689]: E1213 14:32:30.548783 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.649335 kubelet[1689]: E1213 14:32:30.649271 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.750036 kubelet[1689]: E1213 14:32:30.749994 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.851232 kubelet[1689]: E1213 14:32:30.850917 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:30.952013 kubelet[1689]: E1213 14:32:30.951885 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:31.053015 kubelet[1689]: E1213 14:32:31.052920 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:31.154331 kubelet[1689]: E1213 14:32:31.154250 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:31.254989 kubelet[1689]: E1213 14:32:31.254922 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:31.357031 kubelet[1689]: E1213 14:32:31.356933 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:31.458360 kubelet[1689]: E1213 14:32:31.457984 1689 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-6-7-e74dd619d7.novalocal\" not found" Dec 13 14:32:32.154787 kubelet[1689]: I1213 14:32:32.154731 1689 apiserver.go:52] "Watching apiserver" Dec 13 14:32:32.195645 kubelet[1689]: I1213 14:32:32.195558 1689 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:32:32.644057 systemd[1]: Reloading. Dec 13 14:32:32.816523 /usr/lib/systemd/system-generators/torcx-generator[1991]: time="2024-12-13T14:32:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:32:32.816933 /usr/lib/systemd/system-generators/torcx-generator[1991]: time="2024-12-13T14:32:32Z" level=info msg="torcx already run" Dec 13 14:32:32.872750 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:32:32.872771 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:32:32.895838 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:32:33.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.003000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.006000 audit: BPF prog-id=82 op=LOAD Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.009000 audit: BPF prog-id=83 op=LOAD Dec 13 14:32:33.010000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:32:33.010000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:32:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.017000 audit: BPF prog-id=84 op=LOAD Dec 13 14:32:33.019000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.022000 audit: BPF prog-id=85 op=LOAD Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.024000 audit: BPF prog-id=86 op=LOAD Dec 13 14:32:33.024000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:32:33.025000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:32:33.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.029000 audit: BPF prog-id=87 op=LOAD Dec 13 14:32:33.029000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.033000 audit: BPF prog-id=88 op=LOAD Dec 13 14:32:33.033000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.035000 audit: BPF prog-id=89 op=LOAD Dec 13 14:32:33.035000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit: BPF prog-id=90 op=LOAD Dec 13 14:32:33.038000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit: BPF prog-id=91 op=LOAD Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.038000 audit: BPF prog-id=92 op=LOAD Dec 13 14:32:33.038000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:32:33.038000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.039000 audit: BPF prog-id=93 op=LOAD Dec 13 14:32:33.039000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.041000 audit: BPF prog-id=94 op=LOAD Dec 13 14:32:33.041000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit: BPF prog-id=95 op=LOAD Dec 13 14:32:33.043000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit: BPF prog-id=96 op=LOAD Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit: BPF prog-id=97 op=LOAD Dec 13 14:32:33.043000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:32:33.043000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit: BPF prog-id=98 op=LOAD Dec 13 14:32:33.044000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit: BPF prog-id=99 op=LOAD Dec 13 14:32:33.045000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.045000 audit: BPF prog-id=100 op=LOAD Dec 13 14:32:33.045000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.047000 audit: BPF prog-id=101 op=LOAD Dec 13 14:32:33.047000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:33.048000 audit: BPF prog-id=102 op=LOAD Dec 13 14:32:33.048000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:32:33.076025 systemd[1]: Stopping kubelet.service... Dec 13 14:32:33.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:33.092576 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:32:33.092782 systemd[1]: Stopped kubelet.service. Dec 13 14:32:33.092864 systemd[1]: kubelet.service: Consumed 1.196s CPU time. Dec 13 14:32:33.095016 systemd[1]: Starting kubelet.service... Dec 13 14:32:36.123277 systemd[1]: Started kubelet.service. Dec 13 14:32:36.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:36.131908 kernel: kauditd_printk_skb: 259 callbacks suppressed Dec 13 14:32:36.132085 kernel: audit: type=1130 audit(1734100356.125:787): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:36.253941 kubelet[2027]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:36.254545 kubelet[2027]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:32:36.254606 kubelet[2027]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:32:36.256792 kubelet[2027]: I1213 14:32:36.256758 2027 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:32:36.262568 kubelet[2027]: I1213 14:32:36.262523 2027 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:32:36.262568 kubelet[2027]: I1213 14:32:36.262555 2027 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:32:36.262814 kubelet[2027]: I1213 14:32:36.262795 2027 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:32:36.266011 kubelet[2027]: I1213 14:32:36.265985 2027 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:32:36.273901 kubelet[2027]: I1213 14:32:36.273874 2027 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:32:36.291864 kubelet[2027]: I1213 14:32:36.291465 2027 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:32:36.291864 kubelet[2027]: I1213 14:32:36.291653 2027 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:32:36.292055 kubelet[2027]: I1213 14:32:36.291686 2027 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-6-7-e74dd619d7.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:32:36.293463 kubelet[2027]: I1213 14:32:36.293434 2027 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:32:36.293463 kubelet[2027]: I1213 14:32:36.293466 2027 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:32:36.293580 kubelet[2027]: I1213 14:32:36.293511 2027 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:36.293622 kubelet[2027]: I1213 14:32:36.293610 2027 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:32:36.293658 kubelet[2027]: I1213 14:32:36.293626 2027 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:32:36.293658 kubelet[2027]: I1213 14:32:36.293652 2027 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:32:36.293726 kubelet[2027]: I1213 14:32:36.293668 2027 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:32:36.304304 kubelet[2027]: I1213 14:32:36.304267 2027 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:32:36.305865 kubelet[2027]: I1213 14:32:36.304439 2027 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:32:36.305865 kubelet[2027]: I1213 14:32:36.304803 2027 server.go:1264] "Started kubelet" Dec 13 14:32:36.324725 kernel: audit: type=1400 audit(1734100356.307:788): avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.324874 kernel: audit: type=1401 audit(1734100356.307:788): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:36.325676 kernel: audit: type=1300 audit(1734100356.307:788): arch=c000003e syscall=188 success=no exit=-22 a0=c0002dea80 a1=c0006d7c98 a2=c0002dea20 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:36.307000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:36.307000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0002dea80 a1=c0006d7c98 a2=c0002dea20 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:36.326032 kubelet[2027]: I1213 14:32:36.309061 2027 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:32:36.326032 kubelet[2027]: I1213 14:32:36.309107 2027 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:32:36.326032 kubelet[2027]: I1213 14:32:36.309154 2027 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:32:36.326032 kubelet[2027]: I1213 14:32:36.324092 2027 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:32:36.326032 kubelet[2027]: I1213 14:32:36.326000 2027 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:32:36.327688 kubelet[2027]: I1213 14:32:36.327212 2027 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:32:36.327688 kubelet[2027]: I1213 14:32:36.327482 2027 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:32:36.335495 kernel: audit: type=1327 audit(1734100356.307:788): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:36.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:36.335614 kubelet[2027]: E1213 14:32:36.333587 2027 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:32:36.335614 kubelet[2027]: I1213 14:32:36.335580 2027 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:32:36.307000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.339587 kubelet[2027]: I1213 14:32:36.335753 2027 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:32:36.339587 kubelet[2027]: I1213 14:32:36.335918 2027 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:32:36.339587 kubelet[2027]: I1213 14:32:36.336881 2027 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:32:36.339587 kubelet[2027]: I1213 14:32:36.336997 2027 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:32:36.341011 kernel: audit: type=1400 audit(1734100356.307:789): avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.307000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:36.343147 kernel: audit: type=1401 audit(1734100356.307:789): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:36.307000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000f8480 a1=c0006d7cb0 a2=c0002deb10 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:36.350317 kubelet[2027]: I1213 14:32:36.347677 2027 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:32:36.350317 kubelet[2027]: I1213 14:32:36.349433 2027 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:32:36.354977 kernel: audit: type=1300 audit(1734100356.307:789): arch=c000003e syscall=188 success=no exit=-22 a0=c0000f8480 a1=c0006d7cb0 a2=c0002deb10 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:36.355039 kernel: audit: type=1327 audit(1734100356.307:789): proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:36.307000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:36.355099 kubelet[2027]: I1213 14:32:36.353292 2027 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:32:36.355099 kubelet[2027]: I1213 14:32:36.353319 2027 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:32:36.355099 kubelet[2027]: I1213 14:32:36.353344 2027 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:32:36.355099 kubelet[2027]: E1213 14:32:36.353379 2027 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437729 2027 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437748 2027 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437763 2027 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437931 2027 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437942 2027 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:32:36.438172 kubelet[2027]: I1213 14:32:36.437961 2027 policy_none.go:49] "None policy: Start" Dec 13 14:32:36.438769 kubelet[2027]: I1213 14:32:36.438746 2027 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:32:36.438769 kubelet[2027]: I1213 14:32:36.438769 2027 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:32:36.438974 kubelet[2027]: I1213 14:32:36.438953 2027 state_mem.go:75] "Updated machine memory state" Dec 13 14:32:36.447137 kubelet[2027]: I1213 14:32:36.447073 2027 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:32:36.447280 kubelet[2027]: I1213 14:32:36.447149 2027 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:32:36.447331 kubelet[2027]: I1213 14:32:36.447282 2027 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:32:36.445000 audit[2027]: AVC avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.452432 kernel: audit: type=1400 audit(1734100356.445:790): avc: denied { mac_admin } for pid=2027 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:36.452494 kubelet[2027]: I1213 14:32:36.452212 2027 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:32:36.445000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:32:36.445000 audit[2027]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000555ec0 a1=c000d97a58 a2=c000555e90 a3=25 items=0 ppid=1 pid=2027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:36.445000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:32:36.454168 kubelet[2027]: I1213 14:32:36.454091 2027 topology_manager.go:215] "Topology Admit Handler" podUID="1c7399f89869015211aef91dfa465a12" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.454251 kubelet[2027]: I1213 14:32:36.454228 2027 topology_manager.go:215] "Topology Admit Handler" podUID="1bf43a535657f3947c9bddc26fe253aa" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.454312 kubelet[2027]: I1213 14:32:36.454291 2027 topology_manager.go:215] "Topology Admit Handler" podUID="80661cc7a67d7481552c4513b9af44b7" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.471021 kubelet[2027]: W1213 14:32:36.469082 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:32:36.471021 kubelet[2027]: W1213 14:32:36.470762 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:32:36.471021 kubelet[2027]: W1213 14:32:36.470879 2027 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:32:36.537261 kubelet[2027]: I1213 14:32:36.537188 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-k8s-certs\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.537624 kubelet[2027]: I1213 14:32:36.537588 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.537818 kubelet[2027]: I1213 14:32:36.537784 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-ca-certs\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538005 kubelet[2027]: I1213 14:32:36.537950 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538232 kubelet[2027]: I1213 14:32:36.538201 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538399 kubelet[2027]: I1213 14:32:36.538372 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/80661cc7a67d7481552c4513b9af44b7-kubeconfig\") pod \"kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"80661cc7a67d7481552c4513b9af44b7\") " pod="kube-system/kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538549 kubelet[2027]: I1213 14:32:36.538525 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/1c7399f89869015211aef91dfa465a12-ca-certs\") pod \"kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1c7399f89869015211aef91dfa465a12\") " pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538714 kubelet[2027]: I1213 14:32:36.538687 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.538866 kubelet[2027]: I1213 14:32:36.538839 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/1bf43a535657f3947c9bddc26fe253aa-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal\" (UID: \"1bf43a535657f3947c9bddc26fe253aa\") " pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.556688 kubelet[2027]: I1213 14:32:36.556649 2027 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.857218 kubelet[2027]: I1213 14:32:36.856916 2027 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:36.857505 kubelet[2027]: I1213 14:32:36.857197 2027 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:32:37.299039 kubelet[2027]: I1213 14:32:37.298934 2027 apiserver.go:52] "Watching apiserver" Dec 13 14:32:37.337170 kubelet[2027]: I1213 14:32:37.336795 2027 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:32:37.432192 kubelet[2027]: I1213 14:32:37.432057 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-6-7-e74dd619d7.novalocal" podStartSLOduration=1.432023251 podStartE2EDuration="1.432023251s" podCreationTimestamp="2024-12-13 14:32:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:32:37.409243437 +0000 UTC m=+1.254605737" watchObservedRunningTime="2024-12-13 14:32:37.432023251 +0000 UTC m=+1.277385601" Dec 13 14:32:37.457406 kubelet[2027]: I1213 14:32:37.457313 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-6-7-e74dd619d7.novalocal" podStartSLOduration=1.457282446 podStartE2EDuration="1.457282446s" podCreationTimestamp="2024-12-13 14:32:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:32:37.435271697 +0000 UTC m=+1.280634017" watchObservedRunningTime="2024-12-13 14:32:37.457282446 +0000 UTC m=+1.302644746" Dec 13 14:32:37.489076 kubelet[2027]: I1213 14:32:37.489028 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-6-7-e74dd619d7.novalocal" podStartSLOduration=1.489013208 podStartE2EDuration="1.489013208s" podCreationTimestamp="2024-12-13 14:32:36 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:32:37.458471368 +0000 UTC m=+1.303833718" watchObservedRunningTime="2024-12-13 14:32:37.489013208 +0000 UTC m=+1.334375508" Dec 13 14:32:42.899748 sudo[1328]: pam_unix(sudo:session): session closed for user root Dec 13 14:32:42.898000 audit[1328]: USER_END pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:42.901617 kernel: kauditd_printk_skb: 3 callbacks suppressed Dec 13 14:32:42.901732 kernel: audit: type=1106 audit(1734100362.898:791): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:42.898000 audit[1328]: CRED_DISP pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:42.909349 kernel: audit: type=1104 audit(1734100362.898:792): pid=1328 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:32:43.171603 sshd[1325]: pam_unix(sshd:session): session closed for user core Dec 13 14:32:43.173000 audit[1325]: USER_END pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:32:43.201664 kernel: audit: type=1106 audit(1734100363.173:793): pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:32:43.201813 kernel: audit: type=1104 audit(1734100363.174:794): pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:32:43.174000 audit[1325]: CRED_DISP pid=1325 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:32:43.199504 systemd[1]: sshd@8-172.24.4.208:22-172.24.4.1:40256.service: Deactivated successfully. Dec 13 14:32:43.200973 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:32:43.202570 systemd[1]: session-9.scope: Consumed 8.559s CPU time. Dec 13 14:32:43.204955 systemd-logind[1129]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:32:43.207409 systemd-logind[1129]: Removed session 9. Dec 13 14:32:43.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.208:22-172.24.4.1:40256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:43.220411 kernel: audit: type=1131 audit(1734100363.198:795): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.208:22-172.24.4.1:40256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:32:44.909000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526941 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:32:44.923163 kernel: audit: type=1400 audit(1734100364.909:796): avc: denied { watch } for pid=1866 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526941 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:32:44.909000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e2f740 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:44.909000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:44.951172 kernel: audit: type=1300 audit(1734100364.909:796): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e2f740 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:44.951392 kernel: audit: type=1327 audit(1734100364.909:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:45.971000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.972000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.993287 kernel: audit: type=1400 audit(1734100365.971:797): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.993441 kernel: audit: type=1400 audit(1734100365.972:798): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.972000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cb8300 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:45.972000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:45.972000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.972000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cb8380 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:45.972000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:45.972000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:32:45.972000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000cb8400 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:45.972000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:45.971000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000f08400 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:32:45.971000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:32:47.574045 kubelet[2027]: I1213 14:32:47.574021 2027 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:32:47.575168 env[1139]: time="2024-12-13T14:32:47.575139772Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:32:47.575686 kubelet[2027]: I1213 14:32:47.575656 2027 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:32:48.811880 kubelet[2027]: I1213 14:32:48.811809 2027 topology_manager.go:215] "Topology Admit Handler" podUID="2303bb0b-2e65-412e-b50f-2025cca3df30" podNamespace="kube-system" podName="kube-proxy-pkdcx" Dec 13 14:32:48.825047 systemd[1]: Created slice kubepods-besteffort-pod2303bb0b_2e65_412e_b50f_2025cca3df30.slice. Dec 13 14:32:48.892787 kubelet[2027]: I1213 14:32:48.892751 2027 topology_manager.go:215] "Topology Admit Handler" podUID="6c144972-0889-467d-b80d-4ca99acb2b18" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-x7str" Dec 13 14:32:48.896253 kubelet[2027]: W1213 14:32:48.896222 2027 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-6-7-e74dd619d7.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-7-e74dd619d7.novalocal' and this object Dec 13 14:32:48.896431 kubelet[2027]: E1213 14:32:48.896415 2027 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-6-7-e74dd619d7.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-6-7-e74dd619d7.novalocal' and this object Dec 13 14:32:48.898495 systemd[1]: Created slice kubepods-besteffort-pod6c144972_0889_467d_b80d_4ca99acb2b18.slice. Dec 13 14:32:48.915905 kubelet[2027]: I1213 14:32:48.915870 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6c144972-0889-467d-b80d-4ca99acb2b18-var-lib-calico\") pod \"tigera-operator-7bc55997bb-x7str\" (UID: \"6c144972-0889-467d-b80d-4ca99acb2b18\") " pod="tigera-operator/tigera-operator-7bc55997bb-x7str" Dec 13 14:32:48.916154 kubelet[2027]: I1213 14:32:48.916135 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w76qv\" (UniqueName: \"kubernetes.io/projected/6c144972-0889-467d-b80d-4ca99acb2b18-kube-api-access-w76qv\") pod \"tigera-operator-7bc55997bb-x7str\" (UID: \"6c144972-0889-467d-b80d-4ca99acb2b18\") " pod="tigera-operator/tigera-operator-7bc55997bb-x7str" Dec 13 14:32:48.916263 kubelet[2027]: I1213 14:32:48.916247 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/2303bb0b-2e65-412e-b50f-2025cca3df30-kube-proxy\") pod \"kube-proxy-pkdcx\" (UID: \"2303bb0b-2e65-412e-b50f-2025cca3df30\") " pod="kube-system/kube-proxy-pkdcx" Dec 13 14:32:48.916402 kubelet[2027]: I1213 14:32:48.916387 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/2303bb0b-2e65-412e-b50f-2025cca3df30-lib-modules\") pod \"kube-proxy-pkdcx\" (UID: \"2303bb0b-2e65-412e-b50f-2025cca3df30\") " pod="kube-system/kube-proxy-pkdcx" Dec 13 14:32:48.916496 kubelet[2027]: I1213 14:32:48.916482 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hjdtq\" (UniqueName: \"kubernetes.io/projected/2303bb0b-2e65-412e-b50f-2025cca3df30-kube-api-access-hjdtq\") pod \"kube-proxy-pkdcx\" (UID: \"2303bb0b-2e65-412e-b50f-2025cca3df30\") " pod="kube-system/kube-proxy-pkdcx" Dec 13 14:32:48.916588 kubelet[2027]: I1213 14:32:48.916574 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/2303bb0b-2e65-412e-b50f-2025cca3df30-xtables-lock\") pod \"kube-proxy-pkdcx\" (UID: \"2303bb0b-2e65-412e-b50f-2025cca3df30\") " pod="kube-system/kube-proxy-pkdcx" Dec 13 14:32:49.145903 env[1139]: time="2024-12-13T14:32:49.143420595Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pkdcx,Uid:2303bb0b-2e65-412e-b50f-2025cca3df30,Namespace:kube-system,Attempt:0,}" Dec 13 14:32:49.189106 env[1139]: time="2024-12-13T14:32:49.188957998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:49.189437 env[1139]: time="2024-12-13T14:32:49.189056182Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:49.189437 env[1139]: time="2024-12-13T14:32:49.189089154Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:49.189694 env[1139]: time="2024-12-13T14:32:49.189534620Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/306a4ea396b9d460c3b9dd9bd1454faab00368786f122482f6baeb779be6d94a pid=2113 runtime=io.containerd.runc.v2 Dec 13 14:32:49.203634 env[1139]: time="2024-12-13T14:32:49.203563059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-x7str,Uid:6c144972-0889-467d-b80d-4ca99acb2b18,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:32:49.235929 systemd[1]: Started cri-containerd-306a4ea396b9d460c3b9dd9bd1454faab00368786f122482f6baeb779be6d94a.scope. Dec 13 14:32:49.243475 env[1139]: time="2024-12-13T14:32:49.243363127Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:49.243681 env[1139]: time="2024-12-13T14:32:49.243622233Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:49.243681 env[1139]: time="2024-12-13T14:32:49.243649895Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:49.244054 env[1139]: time="2024-12-13T14:32:49.244004070Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e4fc9bbb8828b016670c244f284676ecb52e003e1ccb5f198a7ec0d1366821e pid=2142 runtime=io.containerd.runc.v2 Dec 13 14:32:49.264195 systemd[1]: Started cri-containerd-5e4fc9bbb8828b016670c244f284676ecb52e003e1ccb5f198a7ec0d1366821e.scope. Dec 13 14:32:49.275439 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 14:32:49.275536 kernel: audit: type=1400 audit(1734100369.268:801): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.279782 kernel: audit: type=1400 audit(1734100369.268:802): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.284047 kernel: audit: type=1400 audit(1734100369.268:803): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.292057 kernel: audit: type=1400 audit(1734100369.268:804): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.292106 kernel: audit: type=1400 audit(1734100369.268:805): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.299336 kernel: audit: type=1400 audit(1734100369.268:806): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.299404 kernel: audit: type=1400 audit(1734100369.268:807): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303034 kernel: audit: type=1400 audit(1734100369.268:808): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.268000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.311206 kernel: audit: type=1400 audit(1734100369.268:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.311257 kernel: audit: type=1400 audit(1734100369.274:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.274000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.274000 audit: BPF prog-id=103 op=LOAD Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2113 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366134656133393662396434363063336239646439626431343534 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2113 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366134656133393662396434363063336239646439626431343534 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.278000 audit: BPF prog-id=104 op=LOAD Dec 13 14:32:49.278000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000188f20 items=0 ppid=2113 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366134656133393662396434363063336239646439626431343534 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.287000 audit: BPF prog-id=105 op=LOAD Dec 13 14:32:49.287000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000188f68 items=0 ppid=2113 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366134656133393662396434363063336239646439626431343534 Dec 13 14:32:49.291000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:32:49.291000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { perfmon } for pid=2124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit[2124]: AVC avc: denied { bpf } for pid=2124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.291000 audit: BPF prog-id=106 op=LOAD Dec 13 14:32:49.291000 audit[2124]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000189378 items=0 ppid=2113 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330366134656133393662396434363063336239646439626431343534 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.306000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.306000 audit: BPF prog-id=107 op=LOAD Dec 13 14:32:49.311000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.311000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346663396262623838323862303136363730633234346632383436 Dec 13 14:32:49.315000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.315000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.315000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346663396262623838323862303136363730633234346632383436 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit: BPF prog-id=108 op=LOAD Dec 13 14:32:49.316000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003238c0 items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346663396262623838323862303136363730633234346632383436 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.316000 audit: BPF prog-id=109 op=LOAD Dec 13 14:32:49.316000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000323908 items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.316000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346663396262623838323862303136363730633234346632383436 Dec 13 14:32:49.316000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:32:49.316000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { perfmon } for pid=2154 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit[2154]: AVC avc: denied { bpf } for pid=2154 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.317000 audit: BPF prog-id=110 op=LOAD Dec 13 14:32:49.317000 audit[2154]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000323d18 items=0 ppid=2142 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.317000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565346663396262623838323862303136363730633234346632383436 Dec 13 14:32:49.339793 env[1139]: time="2024-12-13T14:32:49.339756360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-pkdcx,Uid:2303bb0b-2e65-412e-b50f-2025cca3df30,Namespace:kube-system,Attempt:0,} returns sandbox id \"306a4ea396b9d460c3b9dd9bd1454faab00368786f122482f6baeb779be6d94a\"" Dec 13 14:32:49.351766 env[1139]: time="2024-12-13T14:32:49.348004784Z" level=info msg="CreateContainer within sandbox \"306a4ea396b9d460c3b9dd9bd1454faab00368786f122482f6baeb779be6d94a\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:32:49.378465 env[1139]: time="2024-12-13T14:32:49.378407343Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-x7str,Uid:6c144972-0889-467d-b80d-4ca99acb2b18,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5e4fc9bbb8828b016670c244f284676ecb52e003e1ccb5f198a7ec0d1366821e\"" Dec 13 14:32:49.382614 env[1139]: time="2024-12-13T14:32:49.380951525Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:32:49.382614 env[1139]: time="2024-12-13T14:32:49.381083673Z" level=info msg="CreateContainer within sandbox \"306a4ea396b9d460c3b9dd9bd1454faab00368786f122482f6baeb779be6d94a\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"bf9dd55dc1c1ef78dba2b579b841b67a9308ca428cfa3429304137cafbc2b8e5\"" Dec 13 14:32:49.383088 env[1139]: time="2024-12-13T14:32:49.383041706Z" level=info msg="StartContainer for \"bf9dd55dc1c1ef78dba2b579b841b67a9308ca428cfa3429304137cafbc2b8e5\"" Dec 13 14:32:49.408466 systemd[1]: Started cri-containerd-bf9dd55dc1c1ef78dba2b579b841b67a9308ca428cfa3429304137cafbc2b8e5.scope. Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3ea539b0a8 items=0 ppid=2113 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266396464353564633163316566373864626132623537396238343162 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.424000 audit: BPF prog-id=111 op=LOAD Dec 13 14:32:49.424000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f85b8 items=0 ppid=2113 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266396464353564633163316566373864626132623537396238343162 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.426000 audit: BPF prog-id=112 op=LOAD Dec 13 14:32:49.426000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8608 items=0 ppid=2113 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266396464353564633163316566373864626132623537396238343162 Dec 13 14:32:49.427000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:32:49.427000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { perfmon } for pid=2195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit[2195]: AVC avc: denied { bpf } for pid=2195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:49.427000 audit: BPF prog-id=113 op=LOAD Dec 13 14:32:49.427000 audit[2195]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8698 items=0 ppid=2113 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:49.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266396464353564633163316566373864626132623537396238343162 Dec 13 14:32:49.453644 env[1139]: time="2024-12-13T14:32:49.453595562Z" level=info msg="StartContainer for \"bf9dd55dc1c1ef78dba2b579b841b67a9308ca428cfa3429304137cafbc2b8e5\" returns successfully" Dec 13 14:32:50.816000 audit[2247]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.816000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc50a1e230 a2=0 a3=7ffc50a1e21c items=0 ppid=2206 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.816000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:50.821000 audit[2248]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:50.821000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc553b0bc0 a2=0 a3=7ffc553b0bac items=0 ppid=2206 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:32:50.823000 audit[2249]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:50.823000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe35caf7e0 a2=0 a3=7ffe35caf7cc items=0 ppid=2206 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:32:50.824000 audit[2250]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.824000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff46464500 a2=0 a3=7fff464644ec items=0 ppid=2206 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.824000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:32:50.826000 audit[2251]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:50.826000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdac499260 a2=0 a3=7ffdac49924c items=0 ppid=2206 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.826000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:32:50.832000 audit[2252]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.832000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff8b737940 a2=0 a3=7fff8b73792c items=0 ppid=2206 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.832000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:32:50.937000 audit[2253]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.937000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe49afdb30 a2=0 a3=7ffe49afdb1c items=0 ppid=2206 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.937000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:32:50.952000 audit[2255]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.952000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcea63f200 a2=0 a3=7ffcea63f1ec items=0 ppid=2206 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.952000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:32:50.963000 audit[2258]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.963000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffcef8d3390 a2=0 a3=7ffcef8d337c items=0 ppid=2206 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.963000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:32:50.966000 audit[2259]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.966000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb6675330 a2=0 a3=7ffcb667531c items=0 ppid=2206 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:32:50.975000 audit[2261]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2261 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.975000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe526316b0 a2=0 a3=7ffe5263169c items=0 ppid=2206 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.975000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:32:50.978000 audit[2262]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.978000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd675c06b0 a2=0 a3=7ffd675c069c items=0 ppid=2206 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.978000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:32:50.988000 audit[2264]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.988000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbfc3c5b0 a2=0 a3=7ffcbfc3c59c items=0 ppid=2206 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:32:50.997000 audit[2267]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.997000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd7c334a80 a2=0 a3=7ffd7c334a6c items=0 ppid=2206 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.997000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:32:50.999000 audit[2268]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:50.999000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6240c390 a2=0 a3=7fff6240c37c items=0 ppid=2206 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:50.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:32:51.005000 audit[2270]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.005000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff12256ab0 a2=0 a3=7fff12256a9c items=0 ppid=2206 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.005000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:32:51.008000 audit[2271]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.008000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffdd126380 a2=0 a3=7fffdd12636c items=0 ppid=2206 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.008000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:32:51.015000 audit[2273]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.015000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb6bd3240 a2=0 a3=7ffdb6bd322c items=0 ppid=2206 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.015000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:51.026000 audit[2276]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.026000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4946bc50 a2=0 a3=7ffc4946bc3c items=0 ppid=2206 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.026000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:51.031000 audit[2279]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.031000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6f02d5d0 a2=0 a3=7ffc6f02d5bc items=0 ppid=2206 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:32:51.032000 audit[2280]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.032000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd06c0da10 a2=0 a3=7ffd06c0d9fc items=0 ppid=2206 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.032000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:32:51.097000 audit[2282]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.097000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffe32f3b70 a2=0 a3=7fffe32f3b5c items=0 ppid=2206 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.097000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:51.109000 audit[2285]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.109000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe596bb300 a2=0 a3=7ffe596bb2ec items=0 ppid=2206 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:51.112000 audit[2286]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.112000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3428af00 a2=0 a3=7ffd3428aeec items=0 ppid=2206 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:32:51.117000 audit[2288]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:32:51.117000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fff2f387670 a2=0 a3=7fff2f38765c items=0 ppid=2206 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:32:51.518000 audit[2294]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:51.518000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc97d3bb00 a2=0 a3=7ffc97d3baec items=0 ppid=2206 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:51.667000 audit[2294]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:51.667000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc97d3bb00 a2=0 a3=7ffc97d3baec items=0 ppid=2206 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:51.670000 audit[2300]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.670000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe69561a50 a2=0 a3=7ffe69561a3c items=0 ppid=2206 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.670000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:32:51.674000 audit[2302]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.674000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffca1bbc480 a2=0 a3=7ffca1bbc46c items=0 ppid=2206 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:32:51.679000 audit[2305]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.679000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7c05efe0 a2=0 a3=7ffc7c05efcc items=0 ppid=2206 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:32:51.680000 audit[2306]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.680000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1f54f5e0 a2=0 a3=7ffd1f54f5cc items=0 ppid=2206 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.680000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:32:51.687000 audit[2308]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.687000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe482dbd50 a2=0 a3=7ffe482dbd3c items=0 ppid=2206 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.687000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:32:51.692000 audit[2309]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.692000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc542f3f0 a2=0 a3=7fffc542f3dc items=0 ppid=2206 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.692000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:32:51.697000 audit[2311]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.697000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd2ea765b0 a2=0 a3=7ffd2ea7659c items=0 ppid=2206 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.697000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:32:51.703000 audit[2314]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.703000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffff3f34ed0 a2=0 a3=7ffff3f34ebc items=0 ppid=2206 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.703000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:32:51.705000 audit[2315]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.705000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc98a33d50 a2=0 a3=7ffc98a33d3c items=0 ppid=2206 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.705000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:32:51.708000 audit[2317]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.708000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffda82935b0 a2=0 a3=7ffda829359c items=0 ppid=2206 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.708000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:32:51.710000 audit[2318]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.710000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec4684180 a2=0 a3=7ffec468416c items=0 ppid=2206 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:32:51.712000 audit[2320]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2320 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.712000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc54933290 a2=0 a3=7ffc5493327c items=0 ppid=2206 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.712000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:32:51.716000 audit[2323]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2323 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.716000 audit[2323]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe88db53e0 a2=0 a3=7ffe88db53cc items=0 ppid=2206 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.716000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:32:51.720000 audit[2326]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2326 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.720000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff2fba38c0 a2=0 a3=7fff2fba38ac items=0 ppid=2206 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.720000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:32:51.722000 audit[2327]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.722000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc68ffc9e0 a2=0 a3=7ffc68ffc9cc items=0 ppid=2206 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.722000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:32:51.724000 audit[2329]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.724000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff85609080 a2=0 a3=7fff8560906c items=0 ppid=2206 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.724000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:51.728000 audit[2332]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.728000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffce2819070 a2=0 a3=7ffce281905c items=0 ppid=2206 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.728000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:32:51.729000 audit[2333]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.729000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec22f72d0 a2=0 a3=7ffec22f72bc items=0 ppid=2206 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:32:51.732000 audit[2335]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.732000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe6e3191e0 a2=0 a3=7ffe6e3191cc items=0 ppid=2206 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.732000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:32:51.733000 audit[2336]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.733000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0c7e8850 a2=0 a3=7fff0c7e883c items=0 ppid=2206 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.733000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:32:51.736000 audit[2338]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.736000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff50f39fc0 a2=0 a3=7fff50f39fac items=0 ppid=2206 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.736000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:51.739000 audit[2341]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:32:51.739000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcea982850 a2=0 a3=7ffcea98283c items=0 ppid=2206 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.739000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:32:51.743000 audit[2343]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:32:51.743000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffda4cf4eb0 a2=0 a3=7ffda4cf4e9c items=0 ppid=2206 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.743000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:51.743000 audit[2343]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:32:51.743000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffda4cf4eb0 a2=0 a3=7ffda4cf4e9c items=0 ppid=2206 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:51.743000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:51.990820 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3619455830.mount: Deactivated successfully. Dec 13 14:32:53.072986 env[1139]: time="2024-12-13T14:32:53.072825291Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:53.076974 env[1139]: time="2024-12-13T14:32:53.076873966Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:53.080612 env[1139]: time="2024-12-13T14:32:53.080556692Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:53.088356 env[1139]: time="2024-12-13T14:32:53.087093798Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:32:53.090915 env[1139]: time="2024-12-13T14:32:53.090738142Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:32:53.144955 env[1139]: time="2024-12-13T14:32:53.144670608Z" level=info msg="CreateContainer within sandbox \"5e4fc9bbb8828b016670c244f284676ecb52e003e1ccb5f198a7ec0d1366821e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:32:53.559559 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2827486547.mount: Deactivated successfully. Dec 13 14:32:53.565321 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount742031335.mount: Deactivated successfully. Dec 13 14:32:53.572670 env[1139]: time="2024-12-13T14:32:53.572631865Z" level=info msg="CreateContainer within sandbox \"5e4fc9bbb8828b016670c244f284676ecb52e003e1ccb5f198a7ec0d1366821e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b0e0af036c5698a73bce2a7eebd7ce1de8388ce596b066642314faa294378cb5\"" Dec 13 14:32:53.574202 env[1139]: time="2024-12-13T14:32:53.573571579Z" level=info msg="StartContainer for \"b0e0af036c5698a73bce2a7eebd7ce1de8388ce596b066642314faa294378cb5\"" Dec 13 14:32:53.611348 systemd[1]: Started cri-containerd-b0e0af036c5698a73bce2a7eebd7ce1de8388ce596b066642314faa294378cb5.scope. Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.625000 audit: BPF prog-id=114 op=LOAD Dec 13 14:32:53.626000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.626000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2142 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:53.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653061663033366335363938613733626365326137656562643763 Dec 13 14:32:53.626000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.626000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2142 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:53.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653061663033366335363938613733626365326137656562643763 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit: BPF prog-id=115 op=LOAD Dec 13 14:32:53.627000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00029f060 items=0 ppid=2142 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:53.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653061663033366335363938613733626365326137656562643763 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.627000 audit: BPF prog-id=116 op=LOAD Dec 13 14:32:53.627000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00029f0a8 items=0 ppid=2142 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:53.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653061663033366335363938613733626365326137656562643763 Dec 13 14:32:53.628000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:32:53.629000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:53.629000 audit: BPF prog-id=117 op=LOAD Dec 13 14:32:53.629000 audit[2351]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00029f4b8 items=0 ppid=2142 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:53.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230653061663033366335363938613733626365326137656562643763 Dec 13 14:32:53.653944 env[1139]: time="2024-12-13T14:32:53.653899818Z" level=info msg="StartContainer for \"b0e0af036c5698a73bce2a7eebd7ce1de8388ce596b066642314faa294378cb5\" returns successfully" Dec 13 14:32:54.567994 kubelet[2027]: I1213 14:32:54.567887 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-pkdcx" podStartSLOduration=6.567853885 podStartE2EDuration="6.567853885s" podCreationTimestamp="2024-12-13 14:32:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:32:50.48366567 +0000 UTC m=+14.329028071" watchObservedRunningTime="2024-12-13 14:32:54.567853885 +0000 UTC m=+18.413216225" Dec 13 14:32:56.384870 kubelet[2027]: I1213 14:32:56.384770 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-x7str" podStartSLOduration=4.671882313 podStartE2EDuration="8.384733013s" podCreationTimestamp="2024-12-13 14:32:48 +0000 UTC" firstStartedPulling="2024-12-13 14:32:49.379979031 +0000 UTC m=+13.225341331" lastFinishedPulling="2024-12-13 14:32:53.09282968 +0000 UTC m=+16.938192031" observedRunningTime="2024-12-13 14:32:54.569924744 +0000 UTC m=+18.415287094" watchObservedRunningTime="2024-12-13 14:32:56.384733013 +0000 UTC m=+20.230095313" Dec 13 14:32:56.915160 kernel: kauditd_printk_skb: 357 callbacks suppressed Dec 13 14:32:56.915297 kernel: audit: type=1325 audit(1734100376.908:912): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.915333 kernel: audit: type=1300 audit(1734100376.908:912): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffed430e980 a2=0 a3=7ffed430e96c items=0 ppid=2206 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.908000 audit[2388]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.908000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffed430e980 a2=0 a3=7ffed430e96c items=0 ppid=2206 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.908000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.926191 kernel: audit: type=1327 audit(1734100376.908:912): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.925000 audit[2388]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.925000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffed430e980 a2=0 a3=0 items=0 ppid=2206 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.937851 kernel: audit: type=1325 audit(1734100376.925:913): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.937913 kernel: audit: type=1300 audit(1734100376.925:913): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffed430e980 a2=0 a3=0 items=0 ppid=2206 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.925000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.943153 kernel: audit: type=1327 audit(1734100376.925:913): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.971000 audit[2390]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.971000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc87696530 a2=0 a3=7ffc8769651c items=0 ppid=2206 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.982037 kernel: audit: type=1325 audit(1734100376.971:914): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.982148 kernel: audit: type=1300 audit(1734100376.971:914): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc87696530 a2=0 a3=7ffc8769651c items=0 ppid=2206 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.986144 kernel: audit: type=1327 audit(1734100376.971:914): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:56.988000 audit[2390]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.994152 kernel: audit: type=1325 audit(1734100376.988:915): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:56.988000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc87696530 a2=0 a3=0 items=0 ppid=2206 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:56.988000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:57.075456 kubelet[2027]: I1213 14:32:57.075401 2027 topology_manager.go:215] "Topology Admit Handler" podUID="9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8" podNamespace="calico-system" podName="calico-typha-84456df85f-p8hns" Dec 13 14:32:57.081580 systemd[1]: Created slice kubepods-besteffort-pod9f6adc90_a7e9_4e05_a633_6ec8cae4a9c8.slice. Dec 13 14:32:57.234790 kubelet[2027]: I1213 14:32:57.234691 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8-tigera-ca-bundle\") pod \"calico-typha-84456df85f-p8hns\" (UID: \"9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8\") " pod="calico-system/calico-typha-84456df85f-p8hns" Dec 13 14:32:57.234990 kubelet[2027]: I1213 14:32:57.234974 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8-typha-certs\") pod \"calico-typha-84456df85f-p8hns\" (UID: \"9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8\") " pod="calico-system/calico-typha-84456df85f-p8hns" Dec 13 14:32:57.235107 kubelet[2027]: I1213 14:32:57.235088 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l6278\" (UniqueName: \"kubernetes.io/projected/9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8-kube-api-access-l6278\") pod \"calico-typha-84456df85f-p8hns\" (UID: \"9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8\") " pod="calico-system/calico-typha-84456df85f-p8hns" Dec 13 14:32:57.244764 kubelet[2027]: I1213 14:32:57.244732 2027 topology_manager.go:215] "Topology Admit Handler" podUID="7751840d-ddf2-4f3a-9bf9-1e4e0e554920" podNamespace="calico-system" podName="calico-node-54ncq" Dec 13 14:32:57.250869 systemd[1]: Created slice kubepods-besteffort-pod7751840d_ddf2_4f3a_9bf9_1e4e0e554920.slice. Dec 13 14:32:57.437139 kubelet[2027]: I1213 14:32:57.437012 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-xtables-lock\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.437896 kubelet[2027]: I1213 14:32:57.437151 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-tigera-ca-bundle\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.437896 kubelet[2027]: I1213 14:32:57.437213 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-var-run-calico\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.437896 kubelet[2027]: I1213 14:32:57.437258 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-cni-bin-dir\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.437896 kubelet[2027]: I1213 14:32:57.437305 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-lib-modules\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.437896 kubelet[2027]: I1213 14:32:57.437379 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-cni-net-dir\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438499 kubelet[2027]: I1213 14:32:57.437424 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-policysync\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438499 kubelet[2027]: I1213 14:32:57.437468 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j4f4z\" (UniqueName: \"kubernetes.io/projected/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-kube-api-access-j4f4z\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438499 kubelet[2027]: I1213 14:32:57.437515 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-node-certs\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438499 kubelet[2027]: I1213 14:32:57.437560 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-var-lib-calico\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438499 kubelet[2027]: I1213 14:32:57.437621 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-flexvol-driver-host\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.438843 kubelet[2027]: I1213 14:32:57.437667 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/7751840d-ddf2-4f3a-9bf9-1e4e0e554920-cni-log-dir\") pod \"calico-node-54ncq\" (UID: \"7751840d-ddf2-4f3a-9bf9-1e4e0e554920\") " pod="calico-system/calico-node-54ncq" Dec 13 14:32:57.509201 kubelet[2027]: I1213 14:32:57.508988 2027 topology_manager.go:215] "Topology Admit Handler" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" podNamespace="calico-system" podName="csi-node-driver-ddccz" Dec 13 14:32:57.511032 kubelet[2027]: E1213 14:32:57.510548 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:32:57.549628 kubelet[2027]: E1213 14:32:57.549599 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.549778 kubelet[2027]: W1213 14:32:57.549761 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.549875 kubelet[2027]: E1213 14:32:57.549859 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.551286 kubelet[2027]: E1213 14:32:57.551273 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.551383 kubelet[2027]: W1213 14:32:57.551369 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.555333 kubelet[2027]: E1213 14:32:57.555302 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.555904 kubelet[2027]: E1213 14:32:57.555884 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.556014 kubelet[2027]: W1213 14:32:57.555991 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.556142 kubelet[2027]: E1213 14:32:57.556126 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.565797 kubelet[2027]: E1213 14:32:57.565778 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.565944 kubelet[2027]: W1213 14:32:57.565929 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.566059 kubelet[2027]: E1213 14:32:57.566045 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.640681 kubelet[2027]: E1213 14:32:57.640660 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.640827 kubelet[2027]: W1213 14:32:57.640811 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.640919 kubelet[2027]: E1213 14:32:57.640905 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.641010 kubelet[2027]: I1213 14:32:57.640995 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mx792\" (UniqueName: \"kubernetes.io/projected/52f9b8f3-103b-4e3b-bfc8-f1b392cc9252-kube-api-access-mx792\") pod \"csi-node-driver-ddccz\" (UID: \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\") " pod="calico-system/csi-node-driver-ddccz" Dec 13 14:32:57.641806 kubelet[2027]: E1213 14:32:57.641794 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.641886 kubelet[2027]: W1213 14:32:57.641874 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.641976 kubelet[2027]: E1213 14:32:57.641943 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.642303 kubelet[2027]: E1213 14:32:57.642289 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.642388 kubelet[2027]: W1213 14:32:57.642375 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.642462 kubelet[2027]: E1213 14:32:57.642450 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.642618 kubelet[2027]: I1213 14:32:57.642604 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/52f9b8f3-103b-4e3b-bfc8-f1b392cc9252-socket-dir\") pod \"csi-node-driver-ddccz\" (UID: \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\") " pod="calico-system/csi-node-driver-ddccz" Dec 13 14:32:57.642751 kubelet[2027]: E1213 14:32:57.642729 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.642824 kubelet[2027]: W1213 14:32:57.642813 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.642889 kubelet[2027]: E1213 14:32:57.642877 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.643647 kubelet[2027]: E1213 14:32:57.643635 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.643735 kubelet[2027]: W1213 14:32:57.643723 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.643808 kubelet[2027]: E1213 14:32:57.643797 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.643960 kubelet[2027]: I1213 14:32:57.643946 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/52f9b8f3-103b-4e3b-bfc8-f1b392cc9252-varrun\") pod \"csi-node-driver-ddccz\" (UID: \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\") " pod="calico-system/csi-node-driver-ddccz" Dec 13 14:32:57.644091 kubelet[2027]: E1213 14:32:57.644050 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.644192 kubelet[2027]: W1213 14:32:57.644180 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.644260 kubelet[2027]: E1213 14:32:57.644250 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.644507 kubelet[2027]: E1213 14:32:57.644496 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.644575 kubelet[2027]: W1213 14:32:57.644563 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.644642 kubelet[2027]: E1213 14:32:57.644631 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.644848 kubelet[2027]: E1213 14:32:57.644837 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.644912 kubelet[2027]: W1213 14:32:57.644902 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.644978 kubelet[2027]: E1213 14:32:57.644967 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.645178 kubelet[2027]: I1213 14:32:57.645146 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/52f9b8f3-103b-4e3b-bfc8-f1b392cc9252-kubelet-dir\") pod \"csi-node-driver-ddccz\" (UID: \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\") " pod="calico-system/csi-node-driver-ddccz" Dec 13 14:32:57.645293 kubelet[2027]: E1213 14:32:57.645282 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.645359 kubelet[2027]: W1213 14:32:57.645348 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.645428 kubelet[2027]: E1213 14:32:57.645417 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.645666 kubelet[2027]: E1213 14:32:57.645655 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.645744 kubelet[2027]: W1213 14:32:57.645732 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.645825 kubelet[2027]: E1213 14:32:57.645812 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.645906 kubelet[2027]: I1213 14:32:57.645892 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/52f9b8f3-103b-4e3b-bfc8-f1b392cc9252-registration-dir\") pod \"csi-node-driver-ddccz\" (UID: \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\") " pod="calico-system/csi-node-driver-ddccz" Dec 13 14:32:57.646178 kubelet[2027]: E1213 14:32:57.646158 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.646244 kubelet[2027]: W1213 14:32:57.646179 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.646244 kubelet[2027]: E1213 14:32:57.646202 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.646422 kubelet[2027]: E1213 14:32:57.646407 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.646482 kubelet[2027]: W1213 14:32:57.646435 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.646482 kubelet[2027]: E1213 14:32:57.646446 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.646661 kubelet[2027]: E1213 14:32:57.646647 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.646661 kubelet[2027]: W1213 14:32:57.646661 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.646751 kubelet[2027]: E1213 14:32:57.646678 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.646859 kubelet[2027]: E1213 14:32:57.646845 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.646859 kubelet[2027]: W1213 14:32:57.646858 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.646949 kubelet[2027]: E1213 14:32:57.646868 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.647093 kubelet[2027]: E1213 14:32:57.647079 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.647093 kubelet[2027]: W1213 14:32:57.647092 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.647210 kubelet[2027]: E1213 14:32:57.647102 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.687611 env[1139]: time="2024-12-13T14:32:57.687570803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84456df85f-p8hns,Uid:9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8,Namespace:calico-system,Attempt:0,}" Dec 13 14:32:57.724479 env[1139]: time="2024-12-13T14:32:57.724424064Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:57.724665 env[1139]: time="2024-12-13T14:32:57.724637014Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:57.724778 env[1139]: time="2024-12-13T14:32:57.724755556Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:57.724999 env[1139]: time="2024-12-13T14:32:57.724972154Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7a41860d5488fcd1e0fbea2ec206e22e7a2ef9a10ae69e601f5447cea66b24f5 pid=2421 runtime=io.containerd.runc.v2 Dec 13 14:32:57.744171 systemd[1]: Started cri-containerd-7a41860d5488fcd1e0fbea2ec206e22e7a2ef9a10ae69e601f5447cea66b24f5.scope. Dec 13 14:32:57.747607 kubelet[2027]: E1213 14:32:57.747538 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.747607 kubelet[2027]: W1213 14:32:57.747560 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.747607 kubelet[2027]: E1213 14:32:57.747578 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.748049 kubelet[2027]: E1213 14:32:57.747914 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.748049 kubelet[2027]: W1213 14:32:57.747940 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.748049 kubelet[2027]: E1213 14:32:57.747957 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.748531 kubelet[2027]: E1213 14:32:57.748458 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.748531 kubelet[2027]: W1213 14:32:57.748490 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.748531 kubelet[2027]: E1213 14:32:57.748507 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.749441 kubelet[2027]: E1213 14:32:57.749225 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.749441 kubelet[2027]: W1213 14:32:57.749244 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.749441 kubelet[2027]: E1213 14:32:57.749277 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.751375 kubelet[2027]: E1213 14:32:57.751172 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.751375 kubelet[2027]: W1213 14:32:57.751198 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.751375 kubelet[2027]: E1213 14:32:57.751292 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.752529 kubelet[2027]: E1213 14:32:57.751558 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.752529 kubelet[2027]: W1213 14:32:57.751568 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.752529 kubelet[2027]: E1213 14:32:57.751848 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.752529 kubelet[2027]: E1213 14:32:57.751968 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.752529 kubelet[2027]: W1213 14:32:57.751976 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.752529 kubelet[2027]: E1213 14:32:57.752501 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.752888 kubelet[2027]: E1213 14:32:57.752798 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.752888 kubelet[2027]: W1213 14:32:57.752808 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.753179 kubelet[2027]: E1213 14:32:57.752992 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.753179 kubelet[2027]: E1213 14:32:57.753050 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.753179 kubelet[2027]: W1213 14:32:57.753057 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.753330 kubelet[2027]: E1213 14:32:57.753308 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.754371 kubelet[2027]: E1213 14:32:57.754356 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.754467 kubelet[2027]: W1213 14:32:57.754454 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.754620 kubelet[2027]: E1213 14:32:57.754607 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.755977 kubelet[2027]: E1213 14:32:57.755964 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.756054 kubelet[2027]: W1213 14:32:57.756042 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.756170 kubelet[2027]: E1213 14:32:57.756157 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.756406 kubelet[2027]: E1213 14:32:57.756395 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.756499 kubelet[2027]: W1213 14:32:57.756486 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.756655 kubelet[2027]: E1213 14:32:57.756642 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.756866 kubelet[2027]: E1213 14:32:57.756855 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.756933 kubelet[2027]: W1213 14:32:57.756922 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.757079 kubelet[2027]: E1213 14:32:57.757067 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.757299 kubelet[2027]: E1213 14:32:57.757288 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.757377 kubelet[2027]: W1213 14:32:57.757365 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.757515 kubelet[2027]: E1213 14:32:57.757502 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.757641 kubelet[2027]: E1213 14:32:57.757631 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.757710 kubelet[2027]: W1213 14:32:57.757699 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.757865 kubelet[2027]: E1213 14:32:57.757852 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.758711 kubelet[2027]: E1213 14:32:57.758699 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.758798 kubelet[2027]: W1213 14:32:57.758785 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.759023 kubelet[2027]: E1213 14:32:57.759008 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.759336 kubelet[2027]: E1213 14:32:57.759284 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.759796 kubelet[2027]: W1213 14:32:57.759777 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.760000 kubelet[2027]: E1213 14:32:57.759986 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.762758 kubelet[2027]: E1213 14:32:57.762739 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.762927 kubelet[2027]: W1213 14:32:57.762909 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.764675 kubelet[2027]: E1213 14:32:57.763102 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.765030 kubelet[2027]: E1213 14:32:57.765016 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.766479 kubelet[2027]: W1213 14:32:57.766189 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.766479 kubelet[2027]: E1213 14:32:57.766408 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.766479 kubelet[2027]: W1213 14:32:57.766418 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.767193 kubelet[2027]: E1213 14:32:57.767161 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.767261 kubelet[2027]: E1213 14:32:57.767233 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.768049 kubelet[2027]: E1213 14:32:57.767392 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.768049 kubelet[2027]: W1213 14:32:57.767406 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.768049 kubelet[2027]: E1213 14:32:57.767521 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.768049 kubelet[2027]: E1213 14:32:57.767804 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.768049 kubelet[2027]: W1213 14:32:57.767814 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.768049 kubelet[2027]: E1213 14:32:57.767974 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.768049 kubelet[2027]: W1213 14:32:57.767983 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.768270 kubelet[2027]: E1213 14:32:57.768163 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.768270 kubelet[2027]: E1213 14:32:57.768198 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.768566 kubelet[2027]: E1213 14:32:57.768423 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.768566 kubelet[2027]: W1213 14:32:57.768435 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.768566 kubelet[2027]: E1213 14:32:57.768448 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.768743 kubelet[2027]: E1213 14:32:57.768705 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.768743 kubelet[2027]: W1213 14:32:57.768715 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.768743 kubelet[2027]: E1213 14:32:57.768724 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.770000 audit: BPF prog-id=118 op=LOAD Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2421 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343138363064353438386663643165306662656132656332303665 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2421 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343138363064353438386663643165306662656132656332303665 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.771000 audit: BPF prog-id=119 op=LOAD Dec 13 14:32:57.771000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003e8a80 items=0 ppid=2421 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.771000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343138363064353438386663643165306662656132656332303665 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.772000 audit: BPF prog-id=120 op=LOAD Dec 13 14:32:57.772000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003e8ac8 items=0 ppid=2421 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343138363064353438386663643165306662656132656332303665 Dec 13 14:32:57.773000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:32:57.773000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.773000 audit: BPF prog-id=121 op=LOAD Dec 13 14:32:57.773000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003e8ed8 items=0 ppid=2421 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.773000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761343138363064353438386663643165306662656132656332303665 Dec 13 14:32:57.784227 kubelet[2027]: E1213 14:32:57.784191 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:32:57.784227 kubelet[2027]: W1213 14:32:57.784218 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:32:57.784385 kubelet[2027]: E1213 14:32:57.784241 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:32:57.828062 env[1139]: time="2024-12-13T14:32:57.828015092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-84456df85f-p8hns,Uid:9f6adc90-a7e9-4e05-a633-6ec8cae4a9c8,Namespace:calico-system,Attempt:0,} returns sandbox id \"7a41860d5488fcd1e0fbea2ec206e22e7a2ef9a10ae69e601f5447cea66b24f5\"" Dec 13 14:32:57.830323 env[1139]: time="2024-12-13T14:32:57.830286968Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:32:57.855214 env[1139]: time="2024-12-13T14:32:57.855167277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54ncq,Uid:7751840d-ddf2-4f3a-9bf9-1e4e0e554920,Namespace:calico-system,Attempt:0,}" Dec 13 14:32:57.889468 env[1139]: time="2024-12-13T14:32:57.889405468Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:32:57.889790 env[1139]: time="2024-12-13T14:32:57.889762027Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:32:57.889925 env[1139]: time="2024-12-13T14:32:57.889899465Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:32:57.890506 env[1139]: time="2024-12-13T14:32:57.890445851Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca pid=2489 runtime=io.containerd.runc.v2 Dec 13 14:32:57.906967 systemd[1]: Started cri-containerd-e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca.scope. Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.925000 audit: BPF prog-id=122 op=LOAD Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2489 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633638346566313233313136626664646637636464616231613236 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2489 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633638346566313233313136626664646637636464616231613236 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.926000 audit: BPF prog-id=123 op=LOAD Dec 13 14:32:57.926000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00030ca10 items=0 ppid=2489 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633638346566313233313136626664646637636464616231613236 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.927000 audit: BPF prog-id=124 op=LOAD Dec 13 14:32:57.927000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00030ca58 items=0 ppid=2489 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633638346566313233313136626664646637636464616231613236 Dec 13 14:32:57.927000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:32:57.928000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { perfmon } for pid=2498 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit[2498]: AVC avc: denied { bpf } for pid=2498 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:32:57.928000 audit: BPF prog-id=125 op=LOAD Dec 13 14:32:57.928000 audit[2498]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00030ce68 items=0 ppid=2489 pid=2498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:57.928000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538633638346566313233313136626664646637636464616231613236 Dec 13 14:32:57.949183 env[1139]: time="2024-12-13T14:32:57.949142969Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-54ncq,Uid:7751840d-ddf2-4f3a-9bf9-1e4e0e554920,Namespace:calico-system,Attempt:0,} returns sandbox id \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\"" Dec 13 14:32:58.015000 audit[2523]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:58.015000 audit[2523]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff0439bf00 a2=0 a3=7fff0439beec items=0 ppid=2206 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:58.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:58.018000 audit[2523]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:32:58.018000 audit[2523]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff0439bf00 a2=0 a3=0 items=0 ppid=2206 pid=2523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:32:58.018000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:32:59.355644 kubelet[2027]: E1213 14:32:59.354626 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:00.530705 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4163798282.mount: Deactivated successfully. Dec 13 14:33:01.354596 kubelet[2027]: E1213 14:33:01.354512 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:02.567886 env[1139]: time="2024-12-13T14:33:02.567841964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.570723 env[1139]: time="2024-12-13T14:33:02.570688848Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.572726 env[1139]: time="2024-12-13T14:33:02.572700765Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.574554 env[1139]: time="2024-12-13T14:33:02.574520422Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:02.575225 env[1139]: time="2024-12-13T14:33:02.575198725Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:33:02.578440 env[1139]: time="2024-12-13T14:33:02.578386510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:33:02.596396 env[1139]: time="2024-12-13T14:33:02.596278451Z" level=info msg="CreateContainer within sandbox \"7a41860d5488fcd1e0fbea2ec206e22e7a2ef9a10ae69e601f5447cea66b24f5\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:33:02.614268 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3041604689.mount: Deactivated successfully. Dec 13 14:33:02.622517 env[1139]: time="2024-12-13T14:33:02.622472290Z" level=info msg="CreateContainer within sandbox \"7a41860d5488fcd1e0fbea2ec206e22e7a2ef9a10ae69e601f5447cea66b24f5\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"978e8cf3d8066446eead7b225794ac914ad035e0a8aeb9da1ce5e4a8a5b199c1\"" Dec 13 14:33:02.623598 env[1139]: time="2024-12-13T14:33:02.623555624Z" level=info msg="StartContainer for \"978e8cf3d8066446eead7b225794ac914ad035e0a8aeb9da1ce5e4a8a5b199c1\"" Dec 13 14:33:02.653337 systemd[1]: Started cri-containerd-978e8cf3d8066446eead7b225794ac914ad035e0a8aeb9da1ce5e4a8a5b199c1.scope. Dec 13 14:33:02.677989 kernel: kauditd_printk_skb: 122 callbacks suppressed Dec 13 14:33:02.678192 kernel: audit: type=1400 audit(1734100382.670:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.684143 kernel: audit: type=1400 audit(1734100382.670:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.689240 kernel: audit: type=1400 audit(1734100382.670:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.699186 kernel: audit: type=1400 audit(1734100382.670:957): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.699250 kernel: audit: type=1400 audit(1734100382.670:958): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.703224 kernel: audit: type=1400 audit(1734100382.670:959): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.706911 kernel: audit: type=1400 audit(1734100382.670:960): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.710567 kernel: audit: type=1400 audit(1734100382.670:961): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.710621 kernel: audit: type=1400 audit(1734100382.670:962): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.714022 kernel: audit: type=1400 audit(1734100382.671:963): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.671000 audit: BPF prog-id=126 op=LOAD Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2421 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937386538636633643830363634343665656164376232323537393461 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2421 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937386538636633643830363634343665656164376232323537393461 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit: BPF prog-id=127 op=LOAD Dec 13 14:33:02.677000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f3dc0 items=0 ppid=2421 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937386538636633643830363634343665656164376232323537393461 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.677000 audit: BPF prog-id=128 op=LOAD Dec 13 14:33:02.677000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f3e08 items=0 ppid=2421 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937386538636633643830363634343665656164376232323537393461 Dec 13 14:33:02.678000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:33:02.678000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { perfmon } for pid=2533 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit[2533]: AVC avc: denied { bpf } for pid=2533 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:02.678000 audit: BPF prog-id=129 op=LOAD Dec 13 14:33:02.678000 audit[2533]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ce218 items=0 ppid=2421 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:02.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937386538636633643830363634343665656164376232323537393461 Dec 13 14:33:02.738869 env[1139]: time="2024-12-13T14:33:02.738828864Z" level=info msg="StartContainer for \"978e8cf3d8066446eead7b225794ac914ad035e0a8aeb9da1ce5e4a8a5b199c1\" returns successfully" Dec 13 14:33:03.354095 kubelet[2027]: E1213 14:33:03.354014 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:03.568736 kubelet[2027]: I1213 14:33:03.568631 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-84456df85f-p8hns" podStartSLOduration=1.822128369 podStartE2EDuration="6.568598794s" podCreationTimestamp="2024-12-13 14:32:57 +0000 UTC" firstStartedPulling="2024-12-13 14:32:57.829701077 +0000 UTC m=+21.675063377" lastFinishedPulling="2024-12-13 14:33:02.576171492 +0000 UTC m=+26.421533802" observedRunningTime="2024-12-13 14:33:03.568430709 +0000 UTC m=+27.413793059" watchObservedRunningTime="2024-12-13 14:33:03.568598794 +0000 UTC m=+27.413961144" Dec 13 14:33:03.588181 kubelet[2027]: E1213 14:33:03.588075 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.588457 kubelet[2027]: W1213 14:33:03.588423 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.588703 kubelet[2027]: E1213 14:33:03.588670 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.589922 kubelet[2027]: E1213 14:33:03.589896 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.590263 kubelet[2027]: W1213 14:33:03.590231 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.590452 kubelet[2027]: E1213 14:33:03.590419 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.591861 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.594167 kubelet[2027]: W1213 14:33:03.591895 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.591922 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.592438 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.594167 kubelet[2027]: W1213 14:33:03.592461 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.592486 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.592949 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.594167 kubelet[2027]: W1213 14:33:03.593008 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.593037 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.594167 kubelet[2027]: E1213 14:33:03.594002 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.594890 kubelet[2027]: W1213 14:33:03.594028 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.594890 kubelet[2027]: E1213 14:33:03.594053 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.595301 kubelet[2027]: E1213 14:33:03.595256 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.595421 kubelet[2027]: W1213 14:33:03.595311 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.595421 kubelet[2027]: E1213 14:33:03.595337 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.595711 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598170 kubelet[2027]: W1213 14:33:03.595740 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.595761 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.596467 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598170 kubelet[2027]: W1213 14:33:03.596487 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.596518 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.596854 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598170 kubelet[2027]: W1213 14:33:03.596873 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.596893 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598170 kubelet[2027]: E1213 14:33:03.597273 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598865 kubelet[2027]: W1213 14:33:03.597294 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.597313 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.597645 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598865 kubelet[2027]: W1213 14:33:03.597664 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.597684 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.598150 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598865 kubelet[2027]: W1213 14:33:03.598301 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.598325 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.598865 kubelet[2027]: E1213 14:33:03.598649 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.598865 kubelet[2027]: W1213 14:33:03.598669 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.599545 kubelet[2027]: E1213 14:33:03.598688 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.599545 kubelet[2027]: E1213 14:33:03.599018 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.599545 kubelet[2027]: W1213 14:33:03.599037 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.599545 kubelet[2027]: E1213 14:33:03.599058 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.599790 kubelet[2027]: E1213 14:33:03.599561 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.599790 kubelet[2027]: W1213 14:33:03.599582 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.599790 kubelet[2027]: E1213 14:33:03.599603 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.600081 kubelet[2027]: E1213 14:33:03.600035 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.600081 kubelet[2027]: W1213 14:33:03.600069 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.600300 kubelet[2027]: E1213 14:33:03.600097 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.600763 kubelet[2027]: E1213 14:33:03.600634 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.600763 kubelet[2027]: W1213 14:33:03.600666 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.600763 kubelet[2027]: E1213 14:33:03.600694 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.601359 kubelet[2027]: E1213 14:33:03.601305 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.601359 kubelet[2027]: W1213 14:33:03.601350 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.601856 kubelet[2027]: E1213 14:33:03.601647 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.602280 kubelet[2027]: E1213 14:33:03.602069 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.602280 kubelet[2027]: W1213 14:33:03.602091 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.602457 kubelet[2027]: E1213 14:33:03.602327 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.602712 kubelet[2027]: E1213 14:33:03.602660 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.602712 kubelet[2027]: W1213 14:33:03.602698 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.602875 kubelet[2027]: E1213 14:33:03.602851 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.603287 kubelet[2027]: E1213 14:33:03.603239 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.603287 kubelet[2027]: W1213 14:33:03.603271 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.603472 kubelet[2027]: E1213 14:33:03.603313 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.603798 kubelet[2027]: E1213 14:33:03.603747 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.603798 kubelet[2027]: W1213 14:33:03.603779 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.603973 kubelet[2027]: E1213 14:33:03.603941 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.604258 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610198 kubelet[2027]: W1213 14:33:03.604292 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.604435 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.604630 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610198 kubelet[2027]: W1213 14:33:03.604648 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.604838 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.605076 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610198 kubelet[2027]: W1213 14:33:03.605108 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.605234 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610198 kubelet[2027]: E1213 14:33:03.606220 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610920 kubelet[2027]: W1213 14:33:03.606243 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.606437 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.606785 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610920 kubelet[2027]: W1213 14:33:03.606815 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.607059 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.607639 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610920 kubelet[2027]: W1213 14:33:03.607664 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.607729 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.610920 kubelet[2027]: E1213 14:33:03.608244 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.610920 kubelet[2027]: W1213 14:33:03.608265 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.608293 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.609045 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.611613 kubelet[2027]: W1213 14:33:03.609067 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.609278 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.609515 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.611613 kubelet[2027]: W1213 14:33:03.609534 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.609555 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.610776 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:03.611613 kubelet[2027]: W1213 14:33:03.610806 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:03.611613 kubelet[2027]: E1213 14:33:03.610828 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:03.646000 audit[2596]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:03.646000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd21840b70 a2=0 a3=7ffd21840b5c items=0 ppid=2206 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:03.650000 audit[2596]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2596 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:03.650000 audit[2596]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd21840b70 a2=0 a3=7ffd21840b5c items=0 ppid=2206 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:03.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:04.607294 kubelet[2027]: E1213 14:33:04.607245 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.607294 kubelet[2027]: W1213 14:33:04.607285 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.608177 kubelet[2027]: E1213 14:33:04.607317 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.608177 kubelet[2027]: E1213 14:33:04.607640 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.608177 kubelet[2027]: W1213 14:33:04.607660 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.608177 kubelet[2027]: E1213 14:33:04.607681 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.608177 kubelet[2027]: E1213 14:33:04.608033 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.608177 kubelet[2027]: W1213 14:33:04.608053 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.608177 kubelet[2027]: E1213 14:33:04.608073 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.608683 kubelet[2027]: E1213 14:33:04.608422 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.608683 kubelet[2027]: W1213 14:33:04.608443 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.608683 kubelet[2027]: E1213 14:33:04.608462 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.608878 kubelet[2027]: E1213 14:33:04.608748 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.608878 kubelet[2027]: W1213 14:33:04.608767 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.608878 kubelet[2027]: E1213 14:33:04.608787 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.609082 kubelet[2027]: E1213 14:33:04.609047 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.609082 kubelet[2027]: W1213 14:33:04.609065 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.609366 kubelet[2027]: E1213 14:33:04.609085 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.609540 kubelet[2027]: E1213 14:33:04.609494 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.609540 kubelet[2027]: W1213 14:33:04.609529 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.609717 kubelet[2027]: E1213 14:33:04.609552 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.609884 kubelet[2027]: E1213 14:33:04.609845 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.609884 kubelet[2027]: W1213 14:33:04.609876 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.610104 kubelet[2027]: E1213 14:33:04.609897 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.610408 kubelet[2027]: E1213 14:33:04.610368 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.610408 kubelet[2027]: W1213 14:33:04.610397 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.610669 kubelet[2027]: E1213 14:33:04.610417 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.610788 kubelet[2027]: E1213 14:33:04.610742 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.610788 kubelet[2027]: W1213 14:33:04.610774 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.610964 kubelet[2027]: E1213 14:33:04.610794 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.611171 kubelet[2027]: E1213 14:33:04.611088 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.611171 kubelet[2027]: W1213 14:33:04.611147 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.611355 kubelet[2027]: E1213 14:33:04.611194 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.611538 kubelet[2027]: E1213 14:33:04.611489 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.611538 kubelet[2027]: W1213 14:33:04.611519 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.611707 kubelet[2027]: E1213 14:33:04.611539 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.611997 kubelet[2027]: E1213 14:33:04.611946 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.611997 kubelet[2027]: W1213 14:33:04.611979 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.612251 kubelet[2027]: E1213 14:33:04.611999 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.612397 kubelet[2027]: E1213 14:33:04.612365 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.612484 kubelet[2027]: W1213 14:33:04.612397 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.612484 kubelet[2027]: E1213 14:33:04.612417 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.612792 kubelet[2027]: E1213 14:33:04.612760 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.612907 kubelet[2027]: W1213 14:33:04.612793 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.612907 kubelet[2027]: E1213 14:33:04.612816 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.613334 kubelet[2027]: E1213 14:33:04.613305 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.613334 kubelet[2027]: W1213 14:33:04.613333 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.613539 kubelet[2027]: E1213 14:33:04.613354 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.613842 kubelet[2027]: E1213 14:33:04.613787 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.613842 kubelet[2027]: W1213 14:33:04.613828 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.614058 kubelet[2027]: E1213 14:33:04.613859 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.614290 kubelet[2027]: E1213 14:33:04.614258 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.614290 kubelet[2027]: W1213 14:33:04.614288 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.614481 kubelet[2027]: E1213 14:33:04.614317 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.614717 kubelet[2027]: E1213 14:33:04.614690 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.614717 kubelet[2027]: W1213 14:33:04.614718 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.614717 kubelet[2027]: E1213 14:33:04.614750 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.615226 kubelet[2027]: E1213 14:33:04.615194 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.615359 kubelet[2027]: W1213 14:33:04.615230 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.615440 kubelet[2027]: E1213 14:33:04.615385 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.615618 kubelet[2027]: E1213 14:33:04.615592 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.615733 kubelet[2027]: W1213 14:33:04.615618 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.615884 kubelet[2027]: E1213 14:33:04.615788 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.616067 kubelet[2027]: E1213 14:33:04.616040 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.616229 kubelet[2027]: W1213 14:33:04.616069 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.616317 kubelet[2027]: E1213 14:33:04.616274 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.616520 kubelet[2027]: E1213 14:33:04.616495 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.616620 kubelet[2027]: W1213 14:33:04.616520 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.616620 kubelet[2027]: E1213 14:33:04.616549 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.616984 kubelet[2027]: E1213 14:33:04.616955 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.617095 kubelet[2027]: W1213 14:33:04.616986 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.617095 kubelet[2027]: E1213 14:33:04.617017 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.617865 kubelet[2027]: E1213 14:33:04.617755 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.617865 kubelet[2027]: W1213 14:33:04.617785 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.617865 kubelet[2027]: E1213 14:33:04.617823 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.618363 kubelet[2027]: E1213 14:33:04.618311 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.618363 kubelet[2027]: W1213 14:33:04.618345 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.618632 kubelet[2027]: E1213 14:33:04.618599 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.618834 kubelet[2027]: E1213 14:33:04.618651 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.619004 kubelet[2027]: W1213 14:33:04.618975 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.619388 kubelet[2027]: E1213 14:33:04.619358 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.619680 kubelet[2027]: E1213 14:33:04.619654 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.619836 kubelet[2027]: W1213 14:33:04.619810 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.620058 kubelet[2027]: E1213 14:33:04.620013 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.620583 kubelet[2027]: E1213 14:33:04.620557 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.620745 kubelet[2027]: W1213 14:33:04.620719 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.620979 kubelet[2027]: E1213 14:33:04.620926 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.621510 kubelet[2027]: E1213 14:33:04.621484 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.621692 kubelet[2027]: W1213 14:33:04.621664 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.621848 kubelet[2027]: E1213 14:33:04.621821 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.622420 kubelet[2027]: E1213 14:33:04.622394 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.622603 kubelet[2027]: W1213 14:33:04.622576 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.622792 kubelet[2027]: E1213 14:33:04.622762 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.623219 kubelet[2027]: E1213 14:33:04.623188 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.623219 kubelet[2027]: W1213 14:33:04.623218 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.623405 kubelet[2027]: E1213 14:33:04.623241 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:04.623899 kubelet[2027]: E1213 14:33:04.623870 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:04.623899 kubelet[2027]: W1213 14:33:04.623900 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:04.624081 kubelet[2027]: E1213 14:33:04.623922 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.353894 kubelet[2027]: E1213 14:33:05.353819 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.621970 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.666041 kubelet[2027]: W1213 14:33:05.622009 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.622041 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.622423 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.666041 kubelet[2027]: W1213 14:33:05.622444 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.622465 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.622774 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.666041 kubelet[2027]: W1213 14:33:05.622797 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.622828 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.666041 kubelet[2027]: E1213 14:33:05.623198 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.667992 kubelet[2027]: W1213 14:33:05.623219 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.623240 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.623604 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.667992 kubelet[2027]: W1213 14:33:05.623628 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.623648 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.623954 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.667992 kubelet[2027]: W1213 14:33:05.623975 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.623996 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.667992 kubelet[2027]: E1213 14:33:05.624334 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.667992 kubelet[2027]: W1213 14:33:05.624354 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.624374 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.624704 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.668677 kubelet[2027]: W1213 14:33:05.624723 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.624743 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.625072 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.668677 kubelet[2027]: W1213 14:33:05.625092 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.625152 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.625469 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.668677 kubelet[2027]: W1213 14:33:05.625489 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.668677 kubelet[2027]: E1213 14:33:05.625508 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.625816 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.669441 kubelet[2027]: W1213 14:33:05.625835 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.625854 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.626242 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.669441 kubelet[2027]: W1213 14:33:05.626262 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.626282 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.626644 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.669441 kubelet[2027]: W1213 14:33:05.626663 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.626683 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.669441 kubelet[2027]: E1213 14:33:05.627023 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.670157 kubelet[2027]: W1213 14:33:05.627054 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.670157 kubelet[2027]: E1213 14:33:05.627087 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.670157 kubelet[2027]: E1213 14:33:05.627501 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.670157 kubelet[2027]: W1213 14:33:05.627523 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.670157 kubelet[2027]: E1213 14:33:05.627544 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.721933 kubelet[2027]: E1213 14:33:05.721851 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.721933 kubelet[2027]: W1213 14:33:05.721891 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.721933 kubelet[2027]: E1213 14:33:05.721923 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.722470 kubelet[2027]: E1213 14:33:05.722449 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.722555 kubelet[2027]: W1213 14:33:05.722470 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.722555 kubelet[2027]: E1213 14:33:05.722500 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.722961 kubelet[2027]: E1213 14:33:05.722917 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.722961 kubelet[2027]: W1213 14:33:05.722949 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.723206 kubelet[2027]: E1213 14:33:05.723008 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.723504 kubelet[2027]: E1213 14:33:05.723474 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.723632 kubelet[2027]: W1213 14:33:05.723505 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.723715 kubelet[2027]: E1213 14:33:05.723658 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.723941 kubelet[2027]: E1213 14:33:05.723894 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.723941 kubelet[2027]: W1213 14:33:05.723921 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.724199 kubelet[2027]: E1213 14:33:05.724055 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.724355 kubelet[2027]: E1213 14:33:05.724323 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.724355 kubelet[2027]: W1213 14:33:05.724353 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.724556 kubelet[2027]: E1213 14:33:05.724501 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.724745 kubelet[2027]: E1213 14:33:05.724719 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.724745 kubelet[2027]: W1213 14:33:05.724745 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.724936 kubelet[2027]: E1213 14:33:05.724774 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.725222 kubelet[2027]: E1213 14:33:05.725175 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.725222 kubelet[2027]: W1213 14:33:05.725203 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.725399 kubelet[2027]: E1213 14:33:05.725233 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.725658 kubelet[2027]: E1213 14:33:05.725625 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.725658 kubelet[2027]: W1213 14:33:05.725657 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.726212 kubelet[2027]: E1213 14:33:05.725886 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.726212 kubelet[2027]: E1213 14:33:05.725946 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.726212 kubelet[2027]: W1213 14:33:05.725991 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.726452 kubelet[2027]: E1213 14:33:05.726307 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.726452 kubelet[2027]: W1213 14:33:05.726327 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.726452 kubelet[2027]: E1213 14:33:05.726347 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.726648 kubelet[2027]: E1213 14:33:05.726616 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.726648 kubelet[2027]: W1213 14:33:05.726635 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.726781 kubelet[2027]: E1213 14:33:05.726655 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.727304 kubelet[2027]: E1213 14:33:05.726988 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.727304 kubelet[2027]: W1213 14:33:05.727021 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.727304 kubelet[2027]: E1213 14:33:05.727041 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.727561 kubelet[2027]: E1213 14:33:05.727376 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.728189 kubelet[2027]: E1213 14:33:05.727907 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.728189 kubelet[2027]: W1213 14:33:05.727937 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.728189 kubelet[2027]: E1213 14:33:05.727976 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.728742 kubelet[2027]: E1213 14:33:05.728631 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.728742 kubelet[2027]: W1213 14:33:05.728659 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.728742 kubelet[2027]: E1213 14:33:05.728696 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.729033 kubelet[2027]: E1213 14:33:05.728998 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.729177 kubelet[2027]: W1213 14:33:05.729035 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.729177 kubelet[2027]: E1213 14:33:05.729057 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.729518 kubelet[2027]: E1213 14:33:05.729454 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.729518 kubelet[2027]: W1213 14:33:05.729488 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.729518 kubelet[2027]: E1213 14:33:05.729508 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:05.730395 kubelet[2027]: E1213 14:33:05.730347 2027 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:33:05.730395 kubelet[2027]: W1213 14:33:05.730383 2027 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:33:05.730652 kubelet[2027]: E1213 14:33:05.730404 2027 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:33:07.109572 env[1139]: time="2024-12-13T14:33:07.109520147Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:07.115573 env[1139]: time="2024-12-13T14:33:07.115520722Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:07.117980 env[1139]: time="2024-12-13T14:33:07.117929254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:07.120825 env[1139]: time="2024-12-13T14:33:07.120781698Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:07.121626 env[1139]: time="2024-12-13T14:33:07.121590396Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:33:07.124174 env[1139]: time="2024-12-13T14:33:07.124137398Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:33:07.166227 env[1139]: time="2024-12-13T14:33:07.166187375Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093\"" Dec 13 14:33:07.166967 env[1139]: time="2024-12-13T14:33:07.166937072Z" level=info msg="StartContainer for \"422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093\"" Dec 13 14:33:07.188435 systemd[1]: Started cri-containerd-422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093.scope. Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f517fced198 items=0 ppid=2489 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326536323562633863383162646339316135396635343563323630 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.233000 audit: BPF prog-id=130 op=LOAD Dec 13 14:33:07.233000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002c5e48 items=0 ppid=2489 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326536323562633863383162646339316135396635343563323630 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit: BPF prog-id=131 op=LOAD Dec 13 14:33:07.234000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002c5e98 items=0 ppid=2489 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326536323562633863383162646339316135396635343563323630 Dec 13 14:33:07.234000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:33:07.234000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { perfmon } for pid=2671 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit[2671]: AVC avc: denied { bpf } for pid=2671 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:07.234000 audit: BPF prog-id=132 op=LOAD Dec 13 14:33:07.234000 audit[2671]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002c5f28 items=0 ppid=2489 pid=2671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:07.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432326536323562633863383162646339316135396635343563323630 Dec 13 14:33:07.257333 env[1139]: time="2024-12-13T14:33:07.257283040Z" level=info msg="StartContainer for \"422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093\" returns successfully" Dec 13 14:33:07.275270 systemd[1]: cri-containerd-422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093.scope: Deactivated successfully. Dec 13 14:33:07.279000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:33:07.353690 kubelet[2027]: E1213 14:33:07.353634 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:07.439566 env[1139]: time="2024-12-13T14:33:07.439454184Z" level=info msg="shim disconnected" id=422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093 Dec 13 14:33:07.440277 env[1139]: time="2024-12-13T14:33:07.440212469Z" level=warning msg="cleaning up after shim disconnected" id=422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093 namespace=k8s.io Dec 13 14:33:07.440608 env[1139]: time="2024-12-13T14:33:07.440510137Z" level=info msg="cleaning up dead shim" Dec 13 14:33:07.456269 env[1139]: time="2024-12-13T14:33:07.456170525Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2711 runtime=io.containerd.runc.v2\n" Dec 13 14:33:07.554732 env[1139]: time="2024-12-13T14:33:07.553573841Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:33:08.141855 systemd[1]: run-containerd-runc-k8s.io-422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093-runc.g93ihH.mount: Deactivated successfully. Dec 13 14:33:08.142144 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-422e625bc8c81bdc91a59f545c2606a3e0949aea2f9e4c7eb16c76614d3dc093-rootfs.mount: Deactivated successfully. Dec 13 14:33:09.354508 kubelet[2027]: E1213 14:33:09.353974 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:11.354159 kubelet[2027]: E1213 14:33:11.354094 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:13.353880 kubelet[2027]: E1213 14:33:13.353832 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:15.354176 kubelet[2027]: E1213 14:33:15.354088 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:15.689552 env[1139]: time="2024-12-13T14:33:15.689478384Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:15.693550 env[1139]: time="2024-12-13T14:33:15.693492929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:15.698191 env[1139]: time="2024-12-13T14:33:15.698102861Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:15.702265 env[1139]: time="2024-12-13T14:33:15.702187979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:15.705660 env[1139]: time="2024-12-13T14:33:15.703785006Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:33:15.712662 env[1139]: time="2024-12-13T14:33:15.712587467Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:33:15.745826 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3474605285.mount: Deactivated successfully. Dec 13 14:33:16.232097 env[1139]: time="2024-12-13T14:33:16.231909963Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4\"" Dec 13 14:33:16.235361 env[1139]: time="2024-12-13T14:33:16.232811526Z" level=info msg="StartContainer for \"41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4\"" Dec 13 14:33:16.391321 systemd[1]: Started cri-containerd-41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4.scope. Dec 13 14:33:16.532149 kernel: kauditd_printk_skb: 97 callbacks suppressed Dec 13 14:33:16.532273 kernel: audit: type=1400 audit(1734100396.527:981): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.541037 kernel: audit: type=1300 audit(1734100396.527:981): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3bd82398c8 items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:16.527000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.527000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3bd82398c8 items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:16.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393930363631663430373765306234343437313036343334353562 Dec 13 14:33:16.572305 kernel: audit: type=1327 audit(1734100396.527:981): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393930363631663430373765306234343437313036343334353562 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.586764 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.587002 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.600154 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.604166 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.611171 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.622861 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.622936 kernel: audit: type=1400 audit(1734100396.531:982): avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.531000 audit: BPF prog-id=133 op=LOAD Dec 13 14:33:16.531000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002849d8 items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:16.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393930363631663430373765306234343437313036343334353562 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.553000 audit: BPF prog-id=134 op=LOAD Dec 13 14:33:16.553000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000284a28 items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:16.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393930363631663430373765306234343437313036343334353562 Dec 13 14:33:16.553000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:33:16.553000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { perfmon } for pid=2737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit[2737]: AVC avc: denied { bpf } for pid=2737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:16.554000 audit: BPF prog-id=135 op=LOAD Dec 13 14:33:16.554000 audit[2737]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000284ab8 items=0 ppid=2489 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:16.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393930363631663430373765306234343437313036343334353562 Dec 13 14:33:16.626257 env[1139]: time="2024-12-13T14:33:16.626212213Z" level=info msg="StartContainer for \"41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4\" returns successfully" Dec 13 14:33:17.353876 kubelet[2027]: E1213 14:33:17.353757 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:19.133801 env[1139]: time="2024-12-13T14:33:19.133604394Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:33:19.142510 systemd[1]: cri-containerd-41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4.scope: Deactivated successfully. Dec 13 14:33:19.145000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:33:19.186817 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4-rootfs.mount: Deactivated successfully. Dec 13 14:33:19.191695 kubelet[2027]: I1213 14:33:19.191505 2027 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:33:19.210461 env[1139]: time="2024-12-13T14:33:19.210098946Z" level=info msg="shim disconnected" id=41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4 Dec 13 14:33:19.210461 env[1139]: time="2024-12-13T14:33:19.210280607Z" level=warning msg="cleaning up after shim disconnected" id=41990661f4077e0b444710643455bf0b24b906bb075f58cfdda3fdbd2577b8e4 namespace=k8s.io Dec 13 14:33:19.210461 env[1139]: time="2024-12-13T14:33:19.210294032Z" level=info msg="cleaning up dead shim" Dec 13 14:33:19.229715 env[1139]: time="2024-12-13T14:33:19.229676508Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:33:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2777 runtime=io.containerd.runc.v2\n" Dec 13 14:33:19.234431 kubelet[2027]: I1213 14:33:19.234395 2027 topology_manager.go:215] "Topology Admit Handler" podUID="a23f1496-d17b-4daa-ae28-d51655ac4da7" podNamespace="kube-system" podName="coredns-7db6d8ff4d-jkrrc" Dec 13 14:33:19.241571 systemd[1]: Created slice kubepods-burstable-poda23f1496_d17b_4daa_ae28_d51655ac4da7.slice. Dec 13 14:33:19.247921 kubelet[2027]: I1213 14:33:19.247866 2027 topology_manager.go:215] "Topology Admit Handler" podUID="d0198917-c198-4186-9464-1c68de05f597" podNamespace="calico-apiserver" podName="calico-apiserver-858bcf457-pvlkh" Dec 13 14:33:19.256679 kubelet[2027]: I1213 14:33:19.256647 2027 topology_manager.go:215] "Topology Admit Handler" podUID="c32010a5-81f8-424b-881a-ee5399e44778" podNamespace="calico-apiserver" podName="calico-apiserver-858bcf457-rgwl4" Dec 13 14:33:19.257193 kubelet[2027]: I1213 14:33:19.257175 2027 topology_manager.go:215] "Topology Admit Handler" podUID="6329febd-f041-4c27-bc62-1c4625a32daa" podNamespace="kube-system" podName="coredns-7db6d8ff4d-s8rc4" Dec 13 14:33:19.260778 systemd[1]: Created slice kubepods-besteffort-podd0198917_c198_4186_9464_1c68de05f597.slice. Dec 13 14:33:19.262647 kubelet[2027]: I1213 14:33:19.262163 2027 topology_manager.go:215] "Topology Admit Handler" podUID="6a632170-9ddc-4121-ae93-2bbdd59415f9" podNamespace="calico-system" podName="calico-kube-controllers-85c677f955-rrnxr" Dec 13 14:33:19.272888 systemd[1]: Created slice kubepods-burstable-pod6329febd_f041_4c27_bc62_1c4625a32daa.slice. Dec 13 14:33:19.279267 systemd[1]: Created slice kubepods-besteffort-podc32010a5_81f8_424b_881a_ee5399e44778.slice. Dec 13 14:33:19.286499 systemd[1]: Created slice kubepods-besteffort-pod6a632170_9ddc_4121_ae93_2bbdd59415f9.slice. Dec 13 14:33:19.329902 kubelet[2027]: I1213 14:33:19.329863 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a23f1496-d17b-4daa-ae28-d51655ac4da7-config-volume\") pod \"coredns-7db6d8ff4d-jkrrc\" (UID: \"a23f1496-d17b-4daa-ae28-d51655ac4da7\") " pod="kube-system/coredns-7db6d8ff4d-jkrrc" Dec 13 14:33:19.330458 kubelet[2027]: I1213 14:33:19.330403 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dngvb\" (UniqueName: \"kubernetes.io/projected/a23f1496-d17b-4daa-ae28-d51655ac4da7-kube-api-access-dngvb\") pod \"coredns-7db6d8ff4d-jkrrc\" (UID: \"a23f1496-d17b-4daa-ae28-d51655ac4da7\") " pod="kube-system/coredns-7db6d8ff4d-jkrrc" Dec 13 14:33:19.359228 systemd[1]: Created slice kubepods-besteffort-pod52f9b8f3_103b_4e3b_bfc8_f1b392cc9252.slice. Dec 13 14:33:19.370779 env[1139]: time="2024-12-13T14:33:19.362615041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ddccz,Uid:52f9b8f3-103b-4e3b-bfc8-f1b392cc9252,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:19.431525 kubelet[2027]: I1213 14:33:19.431427 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d0198917-c198-4186-9464-1c68de05f597-calico-apiserver-certs\") pod \"calico-apiserver-858bcf457-pvlkh\" (UID: \"d0198917-c198-4186-9464-1c68de05f597\") " pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" Dec 13 14:33:19.431716 kubelet[2027]: I1213 14:33:19.431626 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-b56xv\" (UniqueName: \"kubernetes.io/projected/c32010a5-81f8-424b-881a-ee5399e44778-kube-api-access-b56xv\") pod \"calico-apiserver-858bcf457-rgwl4\" (UID: \"c32010a5-81f8-424b-881a-ee5399e44778\") " pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" Dec 13 14:33:19.431928 kubelet[2027]: I1213 14:33:19.431888 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gzzj2\" (UniqueName: \"kubernetes.io/projected/6329febd-f041-4c27-bc62-1c4625a32daa-kube-api-access-gzzj2\") pod \"coredns-7db6d8ff4d-s8rc4\" (UID: \"6329febd-f041-4c27-bc62-1c4625a32daa\") " pod="kube-system/coredns-7db6d8ff4d-s8rc4" Dec 13 14:33:19.432054 kubelet[2027]: I1213 14:33:19.432012 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6a632170-9ddc-4121-ae93-2bbdd59415f9-tigera-ca-bundle\") pod \"calico-kube-controllers-85c677f955-rrnxr\" (UID: \"6a632170-9ddc-4121-ae93-2bbdd59415f9\") " pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" Dec 13 14:33:19.432312 kubelet[2027]: I1213 14:33:19.432270 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c32010a5-81f8-424b-881a-ee5399e44778-calico-apiserver-certs\") pod \"calico-apiserver-858bcf457-rgwl4\" (UID: \"c32010a5-81f8-424b-881a-ee5399e44778\") " pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" Dec 13 14:33:19.432434 kubelet[2027]: I1213 14:33:19.432394 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4v56d\" (UniqueName: \"kubernetes.io/projected/d0198917-c198-4186-9464-1c68de05f597-kube-api-access-4v56d\") pod \"calico-apiserver-858bcf457-pvlkh\" (UID: \"d0198917-c198-4186-9464-1c68de05f597\") " pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" Dec 13 14:33:19.432613 kubelet[2027]: I1213 14:33:19.432523 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6329febd-f041-4c27-bc62-1c4625a32daa-config-volume\") pod \"coredns-7db6d8ff4d-s8rc4\" (UID: \"6329febd-f041-4c27-bc62-1c4625a32daa\") " pod="kube-system/coredns-7db6d8ff4d-s8rc4" Dec 13 14:33:19.432750 kubelet[2027]: I1213 14:33:19.432692 2027 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9kgnl\" (UniqueName: \"kubernetes.io/projected/6a632170-9ddc-4121-ae93-2bbdd59415f9-kube-api-access-9kgnl\") pod \"calico-kube-controllers-85c677f955-rrnxr\" (UID: \"6a632170-9ddc-4121-ae93-2bbdd59415f9\") " pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" Dec 13 14:33:19.643920 env[1139]: time="2024-12-13T14:33:19.643619601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:33:19.845931 env[1139]: time="2024-12-13T14:33:19.845767313Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jkrrc,Uid:a23f1496-d17b-4daa-ae28-d51655ac4da7,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:19.872474 env[1139]: time="2024-12-13T14:33:19.872376182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-pvlkh,Uid:d0198917-c198-4186-9464-1c68de05f597,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:33:19.877756 env[1139]: time="2024-12-13T14:33:19.877673824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-s8rc4,Uid:6329febd-f041-4c27-bc62-1c4625a32daa,Namespace:kube-system,Attempt:0,}" Dec 13 14:33:19.886925 env[1139]: time="2024-12-13T14:33:19.886724250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-rgwl4,Uid:c32010a5-81f8-424b-881a-ee5399e44778,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:33:19.892202 env[1139]: time="2024-12-13T14:33:19.892047501Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c677f955-rrnxr,Uid:6a632170-9ddc-4121-ae93-2bbdd59415f9,Namespace:calico-system,Attempt:0,}" Dec 13 14:33:20.040961 env[1139]: time="2024-12-13T14:33:20.040841200Z" level=error msg="Failed to destroy network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.041486 env[1139]: time="2024-12-13T14:33:20.041416990Z" level=error msg="encountered an error cleaning up failed sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.041550 env[1139]: time="2024-12-13T14:33:20.041508381Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ddccz,Uid:52f9b8f3-103b-4e3b-bfc8-f1b392cc9252,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.042686 kubelet[2027]: E1213 14:33:20.042580 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.042784 kubelet[2027]: E1213 14:33:20.042717 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ddccz" Dec 13 14:33:20.042784 kubelet[2027]: E1213 14:33:20.042748 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-ddccz" Dec 13 14:33:20.042893 kubelet[2027]: E1213 14:33:20.042825 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-ddccz_calico-system(52f9b8f3-103b-4e3b-bfc8-f1b392cc9252)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-ddccz_calico-system(52f9b8f3-103b-4e3b-bfc8-f1b392cc9252)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:20.075048 env[1139]: time="2024-12-13T14:33:20.074968538Z" level=error msg="Failed to destroy network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.075500 env[1139]: time="2024-12-13T14:33:20.075456443Z" level=error msg="encountered an error cleaning up failed sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.075560 env[1139]: time="2024-12-13T14:33:20.075524991Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jkrrc,Uid:a23f1496-d17b-4daa-ae28-d51655ac4da7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.075830 kubelet[2027]: E1213 14:33:20.075774 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.075990 kubelet[2027]: E1213 14:33:20.075855 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jkrrc" Dec 13 14:33:20.075990 kubelet[2027]: E1213 14:33:20.075966 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-jkrrc" Dec 13 14:33:20.076162 kubelet[2027]: E1213 14:33:20.076082 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-jkrrc_kube-system(a23f1496-d17b-4daa-ae28-d51655ac4da7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-jkrrc_kube-system(a23f1496-d17b-4daa-ae28-d51655ac4da7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jkrrc" podUID="a23f1496-d17b-4daa-ae28-d51655ac4da7" Dec 13 14:33:20.166042 env[1139]: time="2024-12-13T14:33:20.165944605Z" level=error msg="Failed to destroy network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.166467 env[1139]: time="2024-12-13T14:33:20.166399239Z" level=error msg="encountered an error cleaning up failed sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.166518 env[1139]: time="2024-12-13T14:33:20.166461485Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-rgwl4,Uid:c32010a5-81f8-424b-881a-ee5399e44778,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.167138 kubelet[2027]: E1213 14:33:20.167070 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.167199 kubelet[2027]: E1213 14:33:20.167179 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" Dec 13 14:33:20.167267 kubelet[2027]: E1213 14:33:20.167223 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" Dec 13 14:33:20.167344 kubelet[2027]: E1213 14:33:20.167304 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-858bcf457-rgwl4_calico-apiserver(c32010a5-81f8-424b-881a-ee5399e44778)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-858bcf457-rgwl4_calico-apiserver(c32010a5-81f8-424b-881a-ee5399e44778)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" podUID="c32010a5-81f8-424b-881a-ee5399e44778" Dec 13 14:33:20.169349 env[1139]: time="2024-12-13T14:33:20.169285335Z" level=error msg="Failed to destroy network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.170826 env[1139]: time="2024-12-13T14:33:20.170781202Z" level=error msg="encountered an error cleaning up failed sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.170990 env[1139]: time="2024-12-13T14:33:20.170955529Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c677f955-rrnxr,Uid:6a632170-9ddc-4121-ae93-2bbdd59415f9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.171482 kubelet[2027]: E1213 14:33:20.171372 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.171560 kubelet[2027]: E1213 14:33:20.171516 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" Dec 13 14:33:20.171560 kubelet[2027]: E1213 14:33:20.171544 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" Dec 13 14:33:20.171687 kubelet[2027]: E1213 14:33:20.171611 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85c677f955-rrnxr_calico-system(6a632170-9ddc-4121-ae93-2bbdd59415f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85c677f955-rrnxr_calico-system(6a632170-9ddc-4121-ae93-2bbdd59415f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" podUID="6a632170-9ddc-4121-ae93-2bbdd59415f9" Dec 13 14:33:20.224375 env[1139]: time="2024-12-13T14:33:20.224314900Z" level=error msg="Failed to destroy network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.227473 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f-shm.mount: Deactivated successfully. Dec 13 14:33:20.228025 env[1139]: time="2024-12-13T14:33:20.227976412Z" level=error msg="encountered an error cleaning up failed sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.228213 env[1139]: time="2024-12-13T14:33:20.228166619Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-s8rc4,Uid:6329febd-f041-4c27-bc62-1c4625a32daa,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.228838 kubelet[2027]: E1213 14:33:20.228604 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.228838 kubelet[2027]: E1213 14:33:20.228704 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-s8rc4" Dec 13 14:33:20.228838 kubelet[2027]: E1213 14:33:20.228731 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-s8rc4" Dec 13 14:33:20.229167 kubelet[2027]: E1213 14:33:20.228783 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-s8rc4_kube-system(6329febd-f041-4c27-bc62-1c4625a32daa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-s8rc4_kube-system(6329febd-f041-4c27-bc62-1c4625a32daa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-s8rc4" podUID="6329febd-f041-4c27-bc62-1c4625a32daa" Dec 13 14:33:20.257309 env[1139]: time="2024-12-13T14:33:20.257230715Z" level=error msg="Failed to destroy network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.259711 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a-shm.mount: Deactivated successfully. Dec 13 14:33:20.260509 env[1139]: time="2024-12-13T14:33:20.260456649Z" level=error msg="encountered an error cleaning up failed sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.260676 env[1139]: time="2024-12-13T14:33:20.260615447Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-pvlkh,Uid:d0198917-c198-4186-9464-1c68de05f597,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.261436 kubelet[2027]: E1213 14:33:20.261239 2027 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.261436 kubelet[2027]: E1213 14:33:20.261299 2027 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" Dec 13 14:33:20.261436 kubelet[2027]: E1213 14:33:20.261322 2027 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" Dec 13 14:33:20.261556 kubelet[2027]: E1213 14:33:20.261377 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-858bcf457-pvlkh_calico-apiserver(d0198917-c198-4186-9464-1c68de05f597)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-858bcf457-pvlkh_calico-apiserver(d0198917-c198-4186-9464-1c68de05f597)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" podUID="d0198917-c198-4186-9464-1c68de05f597" Dec 13 14:33:20.649211 kubelet[2027]: I1213 14:33:20.648920 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:20.651896 env[1139]: time="2024-12-13T14:33:20.651714013Z" level=info msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" Dec 13 14:33:20.660053 kubelet[2027]: I1213 14:33:20.659226 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:20.661799 env[1139]: time="2024-12-13T14:33:20.661705325Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:33:20.665531 kubelet[2027]: I1213 14:33:20.665479 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:20.669710 env[1139]: time="2024-12-13T14:33:20.669635597Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:33:20.673431 kubelet[2027]: I1213 14:33:20.673377 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:20.676451 env[1139]: time="2024-12-13T14:33:20.676384935Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:33:20.678273 kubelet[2027]: I1213 14:33:20.678197 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:20.682014 env[1139]: time="2024-12-13T14:33:20.681930372Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:33:20.686354 kubelet[2027]: I1213 14:33:20.686301 2027 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:20.691213 env[1139]: time="2024-12-13T14:33:20.691099690Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:33:20.760027 env[1139]: time="2024-12-13T14:33:20.759946778Z" level=error msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" failed" error="failed to destroy network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.767149 kubelet[2027]: E1213 14:33:20.766898 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:20.767149 kubelet[2027]: E1213 14:33:20.766990 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3"} Dec 13 14:33:20.767149 kubelet[2027]: E1213 14:33:20.767096 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c32010a5-81f8-424b-881a-ee5399e44778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.767529 kubelet[2027]: E1213 14:33:20.767483 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c32010a5-81f8-424b-881a-ee5399e44778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" podUID="c32010a5-81f8-424b-881a-ee5399e44778" Dec 13 14:33:20.774162 env[1139]: time="2024-12-13T14:33:20.773932134Z" level=error msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" failed" error="failed to destroy network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.774675 kubelet[2027]: E1213 14:33:20.774497 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:20.774675 kubelet[2027]: E1213 14:33:20.774567 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a"} Dec 13 14:33:20.774675 kubelet[2027]: E1213 14:33:20.774606 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d0198917-c198-4186-9464-1c68de05f597\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.774675 kubelet[2027]: E1213 14:33:20.774635 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d0198917-c198-4186-9464-1c68de05f597\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" podUID="d0198917-c198-4186-9464-1c68de05f597" Dec 13 14:33:20.828596 env[1139]: time="2024-12-13T14:33:20.828175444Z" level=error msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" failed" error="failed to destroy network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.828866 kubelet[2027]: E1213 14:33:20.828587 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:20.828866 kubelet[2027]: E1213 14:33:20.828674 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c"} Dec 13 14:33:20.828866 kubelet[2027]: E1213 14:33:20.828722 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a23f1496-d17b-4daa-ae28-d51655ac4da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.828866 kubelet[2027]: E1213 14:33:20.828777 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a23f1496-d17b-4daa-ae28-d51655ac4da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jkrrc" podUID="a23f1496-d17b-4daa-ae28-d51655ac4da7" Dec 13 14:33:20.829914 env[1139]: time="2024-12-13T14:33:20.829850989Z" level=error msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" failed" error="failed to destroy network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.830415 kubelet[2027]: E1213 14:33:20.830172 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:20.830415 kubelet[2027]: E1213 14:33:20.830278 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5"} Dec 13 14:33:20.830415 kubelet[2027]: E1213 14:33:20.830333 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a632170-9ddc-4121-ae93-2bbdd59415f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.830415 kubelet[2027]: E1213 14:33:20.830367 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a632170-9ddc-4121-ae93-2bbdd59415f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" podUID="6a632170-9ddc-4121-ae93-2bbdd59415f9" Dec 13 14:33:20.833589 env[1139]: time="2024-12-13T14:33:20.833522920Z" level=error msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" failed" error="failed to destroy network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.834084 kubelet[2027]: E1213 14:33:20.834014 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:20.834187 kubelet[2027]: E1213 14:33:20.834100 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f"} Dec 13 14:33:20.834187 kubelet[2027]: E1213 14:33:20.834163 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6329febd-f041-4c27-bc62-1c4625a32daa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.834302 kubelet[2027]: E1213 14:33:20.834191 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6329febd-f041-4c27-bc62-1c4625a32daa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-s8rc4" podUID="6329febd-f041-4c27-bc62-1c4625a32daa" Dec 13 14:33:20.839503 env[1139]: time="2024-12-13T14:33:20.839447008Z" level=error msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" failed" error="failed to destroy network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:20.839963 kubelet[2027]: E1213 14:33:20.839882 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:20.840042 kubelet[2027]: E1213 14:33:20.839964 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669"} Dec 13 14:33:20.840042 kubelet[2027]: E1213 14:33:20.840020 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:20.840235 kubelet[2027]: E1213 14:33:20.840048 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:28.148000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:28.151098 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:33:28.153356 kernel: audit: type=1400 audit(1734100408.148:988): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:28.148000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237a580 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:28.162369 kernel: audit: type=1300 audit(1734100408.148:988): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00237a580 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:28.164477 kernel: audit: type=1327 audit(1734100408.148:988): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:28.148000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:28.180023 kernel: audit: type=1400 audit(1734100408.148:989): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:28.180205 kernel: audit: type=1300 audit(1734100408.148:989): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024f90e0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:28.148000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:28.148000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0024f90e0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:28.184960 kernel: audit: type=1327 audit(1734100408.148:989): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:28.148000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:29.173000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.173000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009a5c210 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.187518 kernel: audit: type=1400 audit(1734100409.173:990): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.187704 kernel: audit: type=1300 audit(1734100409.173:990): arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c009a5c210 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.187780 kernel: audit: type=1327 audit(1734100409.173:990): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.173000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.195015 kernel: audit: type=1400 audit(1734100409.178:991): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.178000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.178000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c008e00d40 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.178000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.193000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.193000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009a5c300 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.193000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.193000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.193000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008e00d60 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.193000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.199000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.199000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00978bf80 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:29.199000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:29.199000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009afc150 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:33:29.199000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:33:31.798185 env[1139]: time="2024-12-13T14:33:31.797741463Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:33:31.918265 env[1139]: time="2024-12-13T14:33:31.917401940Z" level=error msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" failed" error="failed to destroy network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:31.956754 kubelet[2027]: E1213 14:33:31.956554 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:31.963426 kubelet[2027]: E1213 14:33:31.963236 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3"} Dec 13 14:33:31.963426 kubelet[2027]: E1213 14:33:31.963320 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c32010a5-81f8-424b-881a-ee5399e44778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:31.965704 kubelet[2027]: E1213 14:33:31.965634 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c32010a5-81f8-424b-881a-ee5399e44778\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" podUID="c32010a5-81f8-424b-881a-ee5399e44778" Dec 13 14:33:32.355839 env[1139]: time="2024-12-13T14:33:32.355801239Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:33:32.358102 env[1139]: time="2024-12-13T14:33:32.358043066Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:33:32.434322 env[1139]: time="2024-12-13T14:33:32.434244723Z" level=error msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" failed" error="failed to destroy network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:32.474815 kubelet[2027]: E1213 14:33:32.474740 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:32.474815 kubelet[2027]: E1213 14:33:32.474808 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5"} Dec 13 14:33:32.489254 kubelet[2027]: E1213 14:33:32.474847 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6a632170-9ddc-4121-ae93-2bbdd59415f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:32.489254 kubelet[2027]: E1213 14:33:32.474876 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6a632170-9ddc-4121-ae93-2bbdd59415f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" podUID="6a632170-9ddc-4121-ae93-2bbdd59415f9" Dec 13 14:33:32.489254 kubelet[2027]: E1213 14:33:32.487005 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:32.489254 kubelet[2027]: E1213 14:33:32.487070 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f"} Dec 13 14:33:32.543278 env[1139]: time="2024-12-13T14:33:32.485807146Z" level=error msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" failed" error="failed to destroy network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:32.543380 kubelet[2027]: E1213 14:33:32.487160 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6329febd-f041-4c27-bc62-1c4625a32daa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:32.543380 kubelet[2027]: E1213 14:33:32.487191 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6329febd-f041-4c27-bc62-1c4625a32daa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-s8rc4" podUID="6329febd-f041-4c27-bc62-1c4625a32daa" Dec 13 14:33:33.498491 env[1139]: time="2024-12-13T14:33:33.498406410Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:33:33.512396 env[1139]: time="2024-12-13T14:33:33.512295943Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:33:33.600733 env[1139]: time="2024-12-13T14:33:33.600674147Z" level=error msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" failed" error="failed to destroy network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:33.635522 env[1139]: time="2024-12-13T14:33:33.601766937Z" level=error msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" failed" error="failed to destroy network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:33:33.689673 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2153899154.mount: Deactivated successfully. Dec 13 14:33:33.838075 kubelet[2027]: E1213 14:33:33.826553 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:33.838075 kubelet[2027]: E1213 14:33:33.826812 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c"} Dec 13 14:33:33.838075 kubelet[2027]: E1213 14:33:33.826929 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a23f1496-d17b-4daa-ae28-d51655ac4da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:33.838075 kubelet[2027]: E1213 14:33:33.826968 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a23f1496-d17b-4daa-ae28-d51655ac4da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-jkrrc" podUID="a23f1496-d17b-4daa-ae28-d51655ac4da7" Dec 13 14:33:33.838898 kubelet[2027]: E1213 14:33:33.827166 2027 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:33.838898 kubelet[2027]: E1213 14:33:33.827191 2027 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669"} Dec 13 14:33:33.838898 kubelet[2027]: E1213 14:33:33.827291 2027 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:33:33.838898 kubelet[2027]: E1213 14:33:33.827443 2027 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-ddccz" podUID="52f9b8f3-103b-4e3b-bfc8-f1b392cc9252" Dec 13 14:33:33.872008 env[1139]: time="2024-12-13T14:33:33.871876715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:33.877383 env[1139]: time="2024-12-13T14:33:33.877345507Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:33.879671 env[1139]: time="2024-12-13T14:33:33.879580791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:33.883303 env[1139]: time="2024-12-13T14:33:33.882523713Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:33.886677 env[1139]: time="2024-12-13T14:33:33.886585354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:33:33.942882 env[1139]: time="2024-12-13T14:33:33.942519529Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:33:33.990480 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3287807905.mount: Deactivated successfully. Dec 13 14:33:33.996824 env[1139]: time="2024-12-13T14:33:33.996788691Z" level=info msg="CreateContainer within sandbox \"e8c684ef123116bfddf7cddab1a263f6bc585ac646a01fc5a4ed58e2428d1bca\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382\"" Dec 13 14:33:33.997549 env[1139]: time="2024-12-13T14:33:33.997526977Z" level=info msg="StartContainer for \"adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382\"" Dec 13 14:33:34.041037 systemd[1]: Started cri-containerd-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382.scope. Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.082102 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:33:34.082184 kernel: audit: type=1400 audit(1734100414.077:996): avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f810061fcb8 items=0 ppid=2489 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:34.089400 kernel: audit: type=1300 audit(1734100414.077:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f810061fcb8 items=0 ppid=2489 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:34.089487 kernel: audit: type=1327 audit(1734100414.077:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633037383734353937393835333861646232376530666661616339 Dec 13 14:33:34.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633037383734353937393835333861646232376530666661616339 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.099130 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.103151 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.113493 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.113596 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.114431 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.121161 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit: BPF prog-id=136 op=LOAD Dec 13 14:33:34.134959 kernel: audit: type=1400 audit(1734100414.077:997): avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.077000 audit[3219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b6788 items=0 ppid=2489 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:34.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633037383734353937393835333861646232376530666661616339 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit: BPF prog-id=137 op=LOAD Dec 13 14:33:34.078000 audit[3219]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b67d8 items=0 ppid=2489 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633037383734353937393835333861646232376530666661616339 Dec 13 14:33:34.078000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:33:34.078000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { perfmon } for pid=3219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit[3219]: AVC avc: denied { bpf } for pid=3219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:34.078000 audit: BPF prog-id=138 op=LOAD Dec 13 14:33:34.078000 audit[3219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b6868 items=0 ppid=2489 pid=3219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164633037383734353937393835333861646232376530666661616339 Dec 13 14:33:34.139982 env[1139]: time="2024-12-13T14:33:34.136705269Z" level=info msg="StartContainer for \"adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382\" returns successfully" Dec 13 14:33:34.574908 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:33:34.575103 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:33:34.941440 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.FNIG4P.mount: Deactivated successfully. Dec 13 14:33:35.357358 env[1139]: time="2024-12-13T14:33:35.357083451Z" level=info msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" Dec 13 14:33:35.714077 kubelet[2027]: I1213 14:33:35.557868 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-54ncq" podStartSLOduration=2.580743929 podStartE2EDuration="38.530813243s" podCreationTimestamp="2024-12-13 14:32:57 +0000 UTC" firstStartedPulling="2024-12-13 14:32:57.951673711 +0000 UTC m=+21.797036022" lastFinishedPulling="2024-12-13 14:33:33.901743036 +0000 UTC m=+57.747105336" observedRunningTime="2024-12-13 14:33:35.529818266 +0000 UTC m=+59.375180566" watchObservedRunningTime="2024-12-13 14:33:35.530813243 +0000 UTC m=+59.376175543" Dec 13 14:33:35.960902 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.0Rc7Sz.mount: Deactivated successfully. Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.826 [INFO][3299] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.826 [INFO][3299] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" iface="eth0" netns="/var/run/netns/cni-937dd0db-40d9-1598-1ad2-b9d8e28dc7be" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.827 [INFO][3299] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" iface="eth0" netns="/var/run/netns/cni-937dd0db-40d9-1598-1ad2-b9d8e28dc7be" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.830 [INFO][3299] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" iface="eth0" netns="/var/run/netns/cni-937dd0db-40d9-1598-1ad2-b9d8e28dc7be" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.830 [INFO][3299] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:35.830 [INFO][3299] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.296 [INFO][3306] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.300 [INFO][3306] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.300 [INFO][3306] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.331 [WARNING][3306] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.331 [INFO][3306] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.335 [INFO][3306] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:36.345425 env[1139]: 2024-12-13 14:33:36.341 [INFO][3299] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:33:36.353270 env[1139]: time="2024-12-13T14:33:36.353191695Z" level=info msg="TearDown network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" successfully" Dec 13 14:33:36.353855 systemd[1]: run-netns-cni\x2d937dd0db\x2d40d9\x2d1598\x2d1ad2\x2db9d8e28dc7be.mount: Deactivated successfully. Dec 13 14:33:36.359611 env[1139]: time="2024-12-13T14:33:36.358464299Z" level=info msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" returns successfully" Dec 13 14:33:36.405887 env[1139]: time="2024-12-13T14:33:36.405553876Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-pvlkh,Uid:d0198917-c198-4186-9464-1c68de05f597,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:33:36.714395 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:36.716237 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali90ce1a60c27: link becomes ready Dec 13 14:33:36.718866 systemd-networkd[970]: cali90ce1a60c27: Link UP Dec 13 14:33:36.719319 systemd-networkd[970]: cali90ce1a60c27: Gained carrier Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.542 [INFO][3347] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.556 [INFO][3347] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0 calico-apiserver-858bcf457- calico-apiserver d0198917-c198-4186-9464-1c68de05f597 818 0 2024-12-13 14:32:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:858bcf457 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal calico-apiserver-858bcf457-pvlkh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali90ce1a60c27 [] []}} ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.556 [INFO][3347] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.612 [INFO][3358] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" HandleID="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.629 [INFO][3358] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" HandleID="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000334dd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"calico-apiserver-858bcf457-pvlkh", "timestamp":"2024-12-13 14:33:36.612371769 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.629 [INFO][3358] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.629 [INFO][3358] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.629 [INFO][3358] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.633 [INFO][3358] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.647 [INFO][3358] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.654 [INFO][3358] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.656 [INFO][3358] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.658 [INFO][3358] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.659 [INFO][3358] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.660 [INFO][3358] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36 Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.667 [INFO][3358] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.678 [INFO][3358] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.1/26] block=192.168.82.0/26 handle="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.678 [INFO][3358] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.1/26] handle="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.678 [INFO][3358] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:36.748921 env[1139]: 2024-12-13 14:33:36.678 [INFO][3358] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.1/26] IPv6=[] ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" HandleID="k8s-pod-network.c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.681 [INFO][3347] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0198917-c198-4186-9464-1c68de05f597", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"calico-apiserver-858bcf457-pvlkh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali90ce1a60c27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.681 [INFO][3347] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.1/32] ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.681 [INFO][3347] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali90ce1a60c27 ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.714 [INFO][3347] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.717 [INFO][3347] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0198917-c198-4186-9464-1c68de05f597", ResourceVersion:"818", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36", Pod:"calico-apiserver-858bcf457-pvlkh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali90ce1a60c27", MAC:"9a:01:62:32:33:73", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:36.752809 env[1139]: 2024-12-13 14:33:36.745 [INFO][3347] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-pvlkh" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:33:36.780458 env[1139]: time="2024-12-13T14:33:36.780031449Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:36.780458 env[1139]: time="2024-12-13T14:33:36.780174968Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:36.780458 env[1139]: time="2024-12-13T14:33:36.780205535Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:36.780458 env[1139]: time="2024-12-13T14:33:36.780336330Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36 pid=3385 runtime=io.containerd.runc.v2 Dec 13 14:33:36.794939 systemd[1]: Started cri-containerd-c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36.scope. Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.811000 audit: BPF prog-id=139 op=LOAD Dec 13 14:33:36.812000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.812000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3385 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:36.812000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335613930656338623031373136313061393135663436366162353339 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3385 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:36.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335613930656338623031373136313061393135663436366162353339 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.813000 audit: BPF prog-id=140 op=LOAD Dec 13 14:33:36.813000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000d9ce0 items=0 ppid=3385 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:36.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335613930656338623031373136313061393135663436366162353339 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.814000 audit: BPF prog-id=141 op=LOAD Dec 13 14:33:36.814000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000d9d28 items=0 ppid=3385 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:36.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335613930656338623031373136313061393135663436366162353339 Dec 13 14:33:36.815000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:33:36.815000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { perfmon } for pid=3396 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit[3396]: AVC avc: denied { bpf } for pid=3396 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:36.815000 audit: BPF prog-id=142 op=LOAD Dec 13 14:33:36.815000 audit[3396]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00035c138 items=0 ppid=3385 pid=3396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:36.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335613930656338623031373136313061393135663436366162353339 Dec 13 14:33:36.849535 env[1139]: time="2024-12-13T14:33:36.849461905Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-pvlkh,Uid:d0198917-c198-4186-9464-1c68de05f597,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36\"" Dec 13 14:33:36.851820 env[1139]: time="2024-12-13T14:33:36.851791416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:33:37.248000 audit[3465]: AVC avc: denied { write } for pid=3465 comm="tee" name="fd" dev="proc" ino=27365 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.248000 audit[3465]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe053209f8 a2=241 a3=1b6 items=1 ppid=3435 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.248000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:33:37.248000 audit: PATH item=0 name="/dev/fd/63" inode=27361 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.248000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.271000 audit[3477]: AVC avc: denied { write } for pid=3477 comm="tee" name="fd" dev="proc" ino=27375 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.273000 audit[3475]: AVC avc: denied { write } for pid=3475 comm="tee" name="fd" dev="proc" ino=27378 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.274000 audit[3473]: AVC avc: denied { write } for pid=3473 comm="tee" name="fd" dev="proc" ino=27381 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.274000 audit[3473]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc06baf9fa a2=241 a3=1b6 items=1 ppid=3444 pid=3473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.274000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:33:37.274000 audit: PATH item=0 name="/dev/fd/63" inode=26535 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.274000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.273000 audit[3475]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe341209e8 a2=241 a3=1b6 items=1 ppid=3437 pid=3475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.273000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:33:37.273000 audit: PATH item=0 name="/dev/fd/63" inode=26536 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.273000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.271000 audit[3477]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe513829f8 a2=241 a3=1b6 items=1 ppid=3427 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.271000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:33:37.271000 audit: PATH item=0 name="/dev/fd/63" inode=26537 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.271000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.281000 audit[3479]: AVC avc: denied { write } for pid=3479 comm="tee" name="fd" dev="proc" ino=26550 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.281000 audit[3479]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd11e169f8 a2=241 a3=1b6 items=1 ppid=3438 pid=3479 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.281000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:33:37.281000 audit: PATH item=0 name="/dev/fd/63" inode=26546 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.281000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.284000 audit[3481]: AVC avc: denied { write } for pid=3481 comm="tee" name="fd" dev="proc" ino=27390 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.284000 audit[3481]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc660639f9 a2=241 a3=1b6 items=1 ppid=3432 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.284000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:33:37.284000 audit: PATH item=0 name="/dev/fd/63" inode=27372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.284000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.327000 audit[3498]: AVC avc: denied { write } for pid=3498 comm="tee" name="fd" dev="proc" ino=27395 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:33:37.327000 audit[3498]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdb1bc99e9 a2=241 a3=1b6 items=1 ppid=3431 pid=3498 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.327000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:33:37.327000 audit: PATH item=0 name="/dev/fd/63" inode=27387 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:33:37.327000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.585000 audit: BPF prog-id=143 op=LOAD Dec 13 14:33:37.585000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffa1b9d0a0 a2=98 a3=3 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.585000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.588000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.591000 audit: BPF prog-id=144 op=LOAD Dec 13 14:33:37.591000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa1b9ce80 a2=74 a3=540051 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.591000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.592000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.592000 audit: BPF prog-id=145 op=LOAD Dec 13 14:33:37.592000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa1b9ceb0 a2=94 a3=2 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.592000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.592000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.713000 audit: BPF prog-id=146 op=LOAD Dec 13 14:33:37.713000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffa1b9cd70 a2=40 a3=1 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.713000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.714000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:33:37.714000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.714000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffa1b9ce40 a2=50 a3=7fffa1b9cf20 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.714000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9cd80 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa1b9cdb0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa1b9ccc0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9cdd0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9cdb0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9cda0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9cdd0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa1b9cdb0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa1b9cdd0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffa1b9cda0 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.731000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.731000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffa1b9ce10 a2=28 a3=0 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa1b9cbc0 a2=50 a3=1 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit: BPF prog-id=147 op=LOAD Dec 13 14:33:37.733000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffa1b9cbc0 a2=94 a3=5 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.733000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:33:37.733000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.733000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffa1b9cc70 a2=50 a3=1 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.733000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffa1b9cd90 a2=4 a3=38 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.734000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:37.734000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa1b9cde0 a2=94 a3=6 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.734000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:37.734000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa1b9c590 a2=94 a3=83 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.734000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.734000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:37.734000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffa1b9c590 a2=94 a3=83 items=0 ppid=3428 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.734000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.754000 audit: BPF prog-id=148 op=LOAD Dec 13 14:33:37.754000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebccd50 a2=98 a3=1999999999999999 items=0 ppid=3428 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.754000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:37.755000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit: BPF prog-id=149 op=LOAD Dec 13 14:33:37.756000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebccc30 a2=74 a3=ffff items=0 ppid=3428 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.756000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:37.756000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.756000 audit: BPF prog-id=150 op=LOAD Dec 13 14:33:37.756000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5ebccc70 a2=40 a3=7fff5ebcce50 items=0 ppid=3428 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.756000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:33:37.757000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:33:37.869250 systemd-networkd[970]: vxlan.calico: Link UP Dec 13 14:33:37.869258 systemd-networkd[970]: vxlan.calico: Gained carrier Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.896000 audit: BPF prog-id=151 op=LOAD Dec 13 14:33:37.896000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5cd17e70 a2=98 a3=100 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.896000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.898000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit: BPF prog-id=152 op=LOAD Dec 13 14:33:37.903000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5cd17c80 a2=74 a3=540051 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.903000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit: BPF prog-id=153 op=LOAD Dec 13 14:33:37.903000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5cd17cb0 a2=94 a3=2 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.903000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17b80 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5cd17bb0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.903000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.903000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5cd17ac0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.903000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17bd0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17bb0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17ba0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17bd0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5cd17bb0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5cd17bd0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc5cd17ba0 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc5cd17c10 a2=28 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.904000 audit: BPF prog-id=154 op=LOAD Dec 13 14:33:37.904000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5cd17a80 a2=40 a3=0 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.904000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.904000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:33:37.908000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.908000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc5cd17a70 a2=50 a3=2800 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.908000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc5cd17a70 a2=50 a3=2800 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.909000 audit: BPF prog-id=155 op=LOAD Dec 13 14:33:37.909000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5cd17290 a2=94 a3=2 items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.909000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.910000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { perfmon } for pid=3571 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit[3571]: AVC avc: denied { bpf } for pid=3571 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.910000 audit: BPF prog-id=156 op=LOAD Dec 13 14:33:37.910000 audit[3571]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc5cd17390 a2=94 a3=2d items=0 ppid=3428 pid=3571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.910000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.914000 audit: BPF prog-id=157 op=LOAD Dec 13 14:33:37.914000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe1d266b50 a2=98 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.914000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:37.914000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit: BPF prog-id=158 op=LOAD Dec 13 14:33:37.915000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1d266930 a2=74 a3=540051 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:37.915000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:37.915000 audit: BPF prog-id=159 op=LOAD Dec 13 14:33:37.915000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1d266960 a2=94 a3=2 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:37.915000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:37.916000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.064000 audit: BPF prog-id=160 op=LOAD Dec 13 14:33:38.064000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe1d266820 a2=40 a3=1 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.064000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.065000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:33:38.065000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.065000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe1d2668f0 a2=50 a3=7ffe1d2669d0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.065000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d266830 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1d266860 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1d266770 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d266880 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d266860 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d266850 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d266880 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1d266860 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1d266880 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe1d266850 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.075000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.075000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe1d2668c0 a2=28 a3=0 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.075000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1d266670 a2=50 a3=1 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit: BPF prog-id=161 op=LOAD Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe1d266670 a2=94 a3=5 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe1d266720 a2=50 a3=1 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe1d266840 a2=4 a3=38 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1d266890 a2=94 a3=6 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.076000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:38.076000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1d266040 a2=94 a3=83 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.076000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { perfmon } for pid=3573 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { confidentiality } for pid=3573 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:33:38.077000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe1d266040 a2=94 a3=83 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.077000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.077000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d267a80 a2=10 a3=f0f1 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.077000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.078000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.078000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d267920 a2=10 a3=3 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.078000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.078000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.078000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d2678c0 a2=10 a3=3 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.078000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.078000 audit[3573]: AVC avc: denied { bpf } for pid=3573 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:38.078000 audit[3573]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe1d2678c0 a2=10 a3=7 items=0 ppid=3428 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.078000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:33:38.083000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:33:38.083000 audit[933]: SYSCALL arch=c000003e syscall=186 success=yes exit=933 a0=55f47eb88610 a1=ffffffffffffffff a2=ffffffff a3=7ffed41cf080 items=0 ppid=1 pid=933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.083000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:33:38.218000 audit[3599]: NETFILTER_CFG table=nat:97 family=2 entries=15 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:38.218000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc58b9b7a0 a2=0 a3=7ffc58b9b78c items=0 ppid=3428 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.218000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:38.221000 audit[3601]: NETFILTER_CFG table=mangle:98 family=2 entries=16 op=nft_register_chain pid=3601 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:38.221000 audit[3601]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe4867deb0 a2=0 a3=7ffe4867de9c items=0 ppid=3428 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.221000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:38.227000 audit[3603]: NETFILTER_CFG table=filter:99 family=2 entries=75 op=nft_register_chain pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:38.227000 audit[3603]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffec723d920 a2=0 a3=7ffec723d90c items=0 ppid=3428 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.227000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:38.231000 audit[3600]: NETFILTER_CFG table=raw:100 family=2 entries=21 op=nft_register_chain pid=3600 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:38.231000 audit[3600]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd8b8d4fd0 a2=0 a3=7ffd8b8d4fbc items=0 ppid=3428 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:38.231000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:38.588583 systemd-networkd[970]: cali90ce1a60c27: Gained IPv6LL Dec 13 14:33:39.867639 systemd-networkd[970]: vxlan.calico: Gained IPv6LL Dec 13 14:33:41.281423 env[1139]: time="2024-12-13T14:33:41.281313688Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.284376 env[1139]: time="2024-12-13T14:33:41.284323255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.287984 env[1139]: time="2024-12-13T14:33:41.287920544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.294089 env[1139]: time="2024-12-13T14:33:41.294023796Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:33:41.294313 env[1139]: time="2024-12-13T14:33:41.293586405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:41.303774 env[1139]: time="2024-12-13T14:33:41.303693799Z" level=info msg="CreateContainer within sandbox \"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:33:41.321281 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1727288043.mount: Deactivated successfully. Dec 13 14:33:41.334176 env[1139]: time="2024-12-13T14:33:41.334135056Z" level=info msg="CreateContainer within sandbox \"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7dc052ef3c2989ea1fd5a745d4d524efc92810af7b46e29a185aaa5dcf78e2e4\"" Dec 13 14:33:41.336731 env[1139]: time="2024-12-13T14:33:41.336651577Z" level=info msg="StartContainer for \"7dc052ef3c2989ea1fd5a745d4d524efc92810af7b46e29a185aaa5dcf78e2e4\"" Dec 13 14:33:41.386916 systemd[1]: Started cri-containerd-7dc052ef3c2989ea1fd5a745d4d524efc92810af7b46e29a185aaa5dcf78e2e4.scope. Dec 13 14:33:41.416269 kernel: kauditd_printk_skb: 607 callbacks suppressed Dec 13 14:33:41.416385 kernel: audit: type=1400 audit(1734100421.409:1122): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.419575 kernel: audit: type=1400 audit(1734100421.409:1123): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.425190 kernel: audit: type=1400 audit(1734100421.409:1124): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.431129 kernel: audit: type=1400 audit(1734100421.409:1125): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.438143 kernel: audit: type=1400 audit(1734100421.409:1126): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.447338 kernel: audit: type=1400 audit(1734100421.409:1127): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.447390 kernel: audit: type=1400 audit(1734100421.409:1128): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.447435 kernel: audit: type=1400 audit(1734100421.409:1129): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.454408 kernel: audit: type=1400 audit(1734100421.409:1130): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.458367 kernel: audit: type=1400 audit(1734100421.410:1131): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit: BPF prog-id=162 op=LOAD Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3385 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633035326566336332393839656131666435613734356434643532 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3385 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633035326566336332393839656131666435613734356434643532 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.410000 audit: BPF prog-id=163 op=LOAD Dec 13 14:33:41.410000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020f0c0 items=0 ppid=3385 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633035326566336332393839656131666435613734356434643532 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit: BPF prog-id=164 op=LOAD Dec 13 14:33:41.415000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020f108 items=0 ppid=3385 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633035326566336332393839656131666435613734356434643532 Dec 13 14:33:41.415000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:33:41.415000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { perfmon } for pid=3621 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit[3621]: AVC avc: denied { bpf } for pid=3621 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:41.415000 audit: BPF prog-id=165 op=LOAD Dec 13 14:33:41.415000 audit[3621]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020f518 items=0 ppid=3385 pid=3621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:41.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764633035326566336332393839656131666435613734356434643532 Dec 13 14:33:41.497580 env[1139]: time="2024-12-13T14:33:41.497514510Z" level=info msg="StartContainer for \"7dc052ef3c2989ea1fd5a745d4d524efc92810af7b46e29a185aaa5dcf78e2e4\" returns successfully" Dec 13 14:33:41.978882 kubelet[2027]: I1213 14:33:41.978751 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-858bcf457-pvlkh" podStartSLOduration=41.532116429 podStartE2EDuration="45.978713269s" podCreationTimestamp="2024-12-13 14:32:56 +0000 UTC" firstStartedPulling="2024-12-13 14:33:36.851211878 +0000 UTC m=+60.696574188" lastFinishedPulling="2024-12-13 14:33:41.297808678 +0000 UTC m=+65.143171028" observedRunningTime="2024-12-13 14:33:41.975219154 +0000 UTC m=+65.820581564" watchObservedRunningTime="2024-12-13 14:33:41.978713269 +0000 UTC m=+65.824075619" Dec 13 14:33:42.151000 audit[3652]: NETFILTER_CFG table=filter:101 family=2 entries=16 op=nft_register_rule pid=3652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:42.151000 audit[3652]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd43ddfa00 a2=0 a3=7ffd43ddf9ec items=0 ppid=2206 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:42.151000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:42.156000 audit[3652]: NETFILTER_CFG table=nat:102 family=2 entries=14 op=nft_register_rule pid=3652 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:42.156000 audit[3652]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd43ddfa00 a2=0 a3=0 items=0 ppid=2206 pid=3652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:42.156000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:42.318932 systemd[1]: run-containerd-runc-k8s.io-7dc052ef3c2989ea1fd5a745d4d524efc92810af7b46e29a185aaa5dcf78e2e4-runc.s6KEL0.mount: Deactivated successfully. Dec 13 14:33:42.964057 kubelet[2027]: I1213 14:33:42.963998 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:33:43.320000 audit[3631]: AVC avc: denied { watch } for pid=3631 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.869191454/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c820,c848 tclass=file permissive=0 Dec 13 14:33:43.320000 audit[3631]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012ae8a0 a2=fc6 a3=0 items=0 ppid=3385 pid=3631 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 key=(null) Dec 13 14:33:43.320000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:33:45.357503 env[1139]: time="2024-12-13T14:33:45.356568896Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:33:45.357503 env[1139]: time="2024-12-13T14:33:45.356915697Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" iface="eth0" netns="/var/run/netns/cni-354dc17f-68a3-6a77-61e1-de25782ba81b" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" iface="eth0" netns="/var/run/netns/cni-354dc17f-68a3-6a77-61e1-de25782ba81b" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" iface="eth0" netns="/var/run/netns/cni-354dc17f-68a3-6a77-61e1-de25782ba81b" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.487 [INFO][3690] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.530 [INFO][3701] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.530 [INFO][3701] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.530 [INFO][3701] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.539 [WARNING][3701] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.539 [INFO][3701] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.542 [INFO][3701] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:45.547353 env[1139]: 2024-12-13 14:33:45.544 [INFO][3690] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:33:45.551242 systemd[1]: run-netns-cni\x2d354dc17f\x2d68a3\x2d6a77\x2d61e1\x2dde25782ba81b.mount: Deactivated successfully. Dec 13 14:33:45.555880 env[1139]: time="2024-12-13T14:33:45.552768308Z" level=info msg="TearDown network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" successfully" Dec 13 14:33:45.555880 env[1139]: time="2024-12-13T14:33:45.552813824Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" returns successfully" Dec 13 14:33:45.555880 env[1139]: time="2024-12-13T14:33:45.553987746Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jkrrc,Uid:a23f1496-d17b-4daa-ae28-d51655ac4da7,Namespace:kube-system,Attempt:1,}" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.526 [INFO][3691] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.526 [INFO][3691] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" iface="eth0" netns="/var/run/netns/cni-80ea3c2c-dfcb-f7fa-82c0-521b788fe1fe" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.527 [INFO][3691] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" iface="eth0" netns="/var/run/netns/cni-80ea3c2c-dfcb-f7fa-82c0-521b788fe1fe" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.528 [INFO][3691] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" iface="eth0" netns="/var/run/netns/cni-80ea3c2c-dfcb-f7fa-82c0-521b788fe1fe" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.528 [INFO][3691] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.528 [INFO][3691] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.601 [INFO][3707] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.601 [INFO][3707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.601 [INFO][3707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.609 [WARNING][3707] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.609 [INFO][3707] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.611 [INFO][3707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:45.615479 env[1139]: 2024-12-13 14:33:45.613 [INFO][3691] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:33:45.640362 env[1139]: time="2024-12-13T14:33:45.620441758Z" level=info msg="TearDown network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" successfully" Dec 13 14:33:45.640362 env[1139]: time="2024-12-13T14:33:45.620524393Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" returns successfully" Dec 13 14:33:45.640362 env[1139]: time="2024-12-13T14:33:45.621243723Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c677f955-rrnxr,Uid:6a632170-9ddc-4121-ae93-2bbdd59415f9,Namespace:calico-system,Attempt:1,}" Dec 13 14:33:45.619336 systemd[1]: run-netns-cni\x2d80ea3c2c\x2ddfcb\x2df7fa\x2d82c0\x2d521b788fe1fe.mount: Deactivated successfully. Dec 13 14:33:45.926982 systemd-networkd[970]: cali8154b1c718a: Link UP Dec 13 14:33:45.930454 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:45.930533 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8154b1c718a: link becomes ready Dec 13 14:33:45.930517 systemd-networkd[970]: cali8154b1c718a: Gained carrier Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.789 [INFO][3714] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0 coredns-7db6d8ff4d- kube-system a23f1496-d17b-4daa-ae28-d51655ac4da7 858 0 2024-12-13 14:32:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal coredns-7db6d8ff4d-jkrrc eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8154b1c718a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.789 [INFO][3714] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.849 [INFO][3735] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" HandleID="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.863 [INFO][3735] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" HandleID="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004d6c00), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"coredns-7db6d8ff4d-jkrrc", "timestamp":"2024-12-13 14:33:45.849690077 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.863 [INFO][3735] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.863 [INFO][3735] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.863 [INFO][3735] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.866 [INFO][3735] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.882 [INFO][3735] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.893 [INFO][3735] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.896 [INFO][3735] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.900 [INFO][3735] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.900 [INFO][3735] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.903 [INFO][3735] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.908 [INFO][3735] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.916 [INFO][3735] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.2/26] block=192.168.82.0/26 handle="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.916 [INFO][3735] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.2/26] handle="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.916 [INFO][3735] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:45.965961 env[1139]: 2024-12-13 14:33:45.916 [INFO][3735] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.2/26] IPv6=[] ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" HandleID="k8s-pod-network.0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.919 [INFO][3714] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a23f1496-d17b-4daa-ae28-d51655ac4da7", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-jkrrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8154b1c718a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.919 [INFO][3714] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.2/32] ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.919 [INFO][3714] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8154b1c718a ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.933 [INFO][3714] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.933 [INFO][3714] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a23f1496-d17b-4daa-ae28-d51655ac4da7", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b", Pod:"coredns-7db6d8ff4d-jkrrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8154b1c718a", MAC:"92:bd:2f:7c:d7:7e", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:45.968471 env[1139]: 2024-12-13 14:33:45.957 [INFO][3714] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b" Namespace="kube-system" Pod="coredns-7db6d8ff4d-jkrrc" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:33:45.980000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:45.980000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698620 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:45.980000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:45.980000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:45.980000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698640 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:45.980000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:45.982000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:45.982000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002758160 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:45.982000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:45.982000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:33:45.982000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002758180 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:33:45.982000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:33:45.993208 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a4fbb0a6d4: link becomes ready Dec 13 14:33:45.993846 systemd-networkd[970]: cali5a4fbb0a6d4: Link UP Dec 13 14:33:45.994172 systemd-networkd[970]: cali5a4fbb0a6d4: Gained carrier Dec 13 14:33:46.014294 env[1139]: time="2024-12-13T14:33:46.014158695Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:46.014472 env[1139]: time="2024-12-13T14:33:46.014306142Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:46.014472 env[1139]: time="2024-12-13T14:33:46.014344003Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:46.014680 env[1139]: time="2024-12-13T14:33:46.014608709Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b pid=3768 runtime=io.containerd.runc.v2 Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.819 [INFO][3724] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0 calico-kube-controllers-85c677f955- calico-system 6a632170-9ddc-4121-ae93-2bbdd59415f9 859 0 2024-12-13 14:32:57 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85c677f955 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal calico-kube-controllers-85c677f955-rrnxr eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5a4fbb0a6d4 [] []}} ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.819 [INFO][3724] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.866 [INFO][3741] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" HandleID="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.876 [INFO][3741] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" HandleID="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050640), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"calico-kube-controllers-85c677f955-rrnxr", "timestamp":"2024-12-13 14:33:45.866093644 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.876 [INFO][3741] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.916 [INFO][3741] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.916 [INFO][3741] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.923 [INFO][3741] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.934 [INFO][3741] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.941 [INFO][3741] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.946 [INFO][3741] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.960 [INFO][3741] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.960 [INFO][3741] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.963 [INFO][3741] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.969 [INFO][3741] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.982 [INFO][3741] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.3/26] block=192.168.82.0/26 handle="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.983 [INFO][3741] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.3/26] handle="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.983 [INFO][3741] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:46.023277 env[1139]: 2024-12-13 14:33:45.983 [INFO][3741] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.3/26] IPv6=[] ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" HandleID="k8s-pod-network.a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:45.987 [INFO][3724] cni-plugin/k8s.go 386: Populated endpoint ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0", GenerateName:"calico-kube-controllers-85c677f955-", Namespace:"calico-system", SelfLink:"", UID:"6a632170-9ddc-4121-ae93-2bbdd59415f9", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c677f955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"calico-kube-controllers-85c677f955-rrnxr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5a4fbb0a6d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:45.987 [INFO][3724] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.3/32] ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:45.987 [INFO][3724] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a4fbb0a6d4 ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:45.992 [INFO][3724] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:45.994 [INFO][3724] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0", GenerateName:"calico-kube-controllers-85c677f955-", Namespace:"calico-system", SelfLink:"", UID:"6a632170-9ddc-4121-ae93-2bbdd59415f9", ResourceVersion:"859", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c677f955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d", Pod:"calico-kube-controllers-85c677f955-rrnxr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5a4fbb0a6d4", MAC:"4a:2e:2f:1c:27:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:46.026456 env[1139]: 2024-12-13 14:33:46.018 [INFO][3724] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d" Namespace="calico-system" Pod="calico-kube-controllers-85c677f955-rrnxr" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:33:46.027000 audit[3780]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3780 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:46.027000 audit[3780]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffc348741a0 a2=0 a3=7ffc3487418c items=0 ppid=3428 pid=3780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:46.042995 systemd[1]: Started cri-containerd-0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b.scope. Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.073000 audit: BPF prog-id=166 op=LOAD Dec 13 14:33:46.074000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.074000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3768 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653131306161303230336435323931616138333038376162376431 Dec 13 14:33:46.074000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.074000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3768 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.074000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653131306161303230336435323931616138333038376162376431 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit: BPF prog-id=167 op=LOAD Dec 13 14:33:46.075000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c74c0 items=0 ppid=3768 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653131306161303230336435323931616138333038376162376431 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit: BPF prog-id=168 op=LOAD Dec 13 14:33:46.075000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c7508 items=0 ppid=3768 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653131306161303230336435323931616138333038376162376431 Dec 13 14:33:46.075000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:33:46.075000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { perfmon } for pid=3782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit[3782]: AVC avc: denied { bpf } for pid=3782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.075000 audit: BPF prog-id=169 op=LOAD Dec 13 14:33:46.075000 audit[3782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c7918 items=0 ppid=3768 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064653131306161303230336435323931616138333038376162376431 Dec 13 14:33:46.078000 audit[3816]: NETFILTER_CFG table=filter:104 family=2 entries=42 op=nft_register_chain pid=3816 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:46.078000 audit[3816]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffcab0ce600 a2=0 a3=7ffcab0ce5ec items=0 ppid=3428 pid=3816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.078000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:46.086408 env[1139]: time="2024-12-13T14:33:46.072033740Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:46.086408 env[1139]: time="2024-12-13T14:33:46.072096097Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:46.086408 env[1139]: time="2024-12-13T14:33:46.072141522Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:46.086408 env[1139]: time="2024-12-13T14:33:46.077204952Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d pid=3817 runtime=io.containerd.runc.v2 Dec 13 14:33:46.105615 systemd[1]: Started cri-containerd-a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d.scope. Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.132000 audit: BPF prog-id=170 op=LOAD Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333164393030646132653332366431386537663833333335396138 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333164393030646132653332366431386537663833333335396138 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit: BPF prog-id=171 op=LOAD Dec 13 14:33:46.133000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002f9e90 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333164393030646132653332366431386537663833333335396138 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit: BPF prog-id=172 op=LOAD Dec 13 14:33:46.133000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002f9ed8 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333164393030646132653332366431386537663833333335396138 Dec 13 14:33:46.133000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:33:46.133000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { perfmon } for pid=3827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit[3827]: AVC avc: denied { bpf } for pid=3827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.133000 audit: BPF prog-id=173 op=LOAD Dec 13 14:33:46.133000 audit[3827]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ec2e8 items=0 ppid=3817 pid=3827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134333164393030646132653332366431386537663833333335396138 Dec 13 14:33:46.151181 env[1139]: time="2024-12-13T14:33:46.151079947Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-jkrrc,Uid:a23f1496-d17b-4daa-ae28-d51655ac4da7,Namespace:kube-system,Attempt:1,} returns sandbox id \"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b\"" Dec 13 14:33:46.156759 env[1139]: time="2024-12-13T14:33:46.156711443Z" level=info msg="CreateContainer within sandbox \"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:33:46.183183 env[1139]: time="2024-12-13T14:33:46.183020012Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85c677f955-rrnxr,Uid:6a632170-9ddc-4121-ae93-2bbdd59415f9,Namespace:calico-system,Attempt:1,} returns sandbox id \"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d\"" Dec 13 14:33:46.188358 env[1139]: time="2024-12-13T14:33:46.188269201Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:33:46.200093 env[1139]: time="2024-12-13T14:33:46.200047109Z" level=info msg="CreateContainer within sandbox \"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9e96732eda644c323899793e10ed862b1804aeb1ffb5a1cc40e31392dd1ecf92\"" Dec 13 14:33:46.202562 env[1139]: time="2024-12-13T14:33:46.201122857Z" level=info msg="StartContainer for \"9e96732eda644c323899793e10ed862b1804aeb1ffb5a1cc40e31392dd1ecf92\"" Dec 13 14:33:46.219867 systemd[1]: Started cri-containerd-9e96732eda644c323899793e10ed862b1804aeb1ffb5a1cc40e31392dd1ecf92.scope. Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.244000 audit: BPF prog-id=174 op=LOAD Dec 13 14:33:46.245000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.245000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3768 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637333265646136343463333233383939373933653130656438 Dec 13 14:33:46.245000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.245000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3768 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.245000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637333265646136343463333233383939373933653130656438 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.246000 audit: BPF prog-id=175 op=LOAD Dec 13 14:33:46.246000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000273de0 items=0 ppid=3768 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637333265646136343463333233383939373933653130656438 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.247000 audit: BPF prog-id=176 op=LOAD Dec 13 14:33:46.247000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000273e28 items=0 ppid=3768 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.247000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637333265646136343463333233383939373933653130656438 Dec 13 14:33:46.248000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:33:46.248000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { perfmon } for pid=3865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit[3865]: AVC avc: denied { bpf } for pid=3865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:46.249000 audit: BPF prog-id=177 op=LOAD Dec 13 14:33:46.249000 audit[3865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b2238 items=0 ppid=3768 pid=3865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:46.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965393637333265646136343463333233383939373933653130656438 Dec 13 14:33:46.279369 env[1139]: time="2024-12-13T14:33:46.279260399Z" level=info msg="StartContainer for \"9e96732eda644c323899793e10ed862b1804aeb1ffb5a1cc40e31392dd1ecf92\" returns successfully" Dec 13 14:33:46.365288 env[1139]: time="2024-12-13T14:33:46.364694160Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:33:46.371050 env[1139]: time="2024-12-13T14:33:46.371007805Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:33:46.599995 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.j2mlKf.mount: Deactivated successfully. Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.509 [INFO][3920] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.509 [INFO][3920] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" iface="eth0" netns="/var/run/netns/cni-4446258a-2f95-f996-543c-e30b5ddf700f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.510 [INFO][3920] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" iface="eth0" netns="/var/run/netns/cni-4446258a-2f95-f996-543c-e30b5ddf700f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.510 [INFO][3920] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" iface="eth0" netns="/var/run/netns/cni-4446258a-2f95-f996-543c-e30b5ddf700f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.510 [INFO][3920] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.510 [INFO][3920] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.576 [INFO][3932] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.576 [INFO][3932] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.576 [INFO][3932] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.589 [WARNING][3932] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.590 [INFO][3932] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.595 [INFO][3932] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:46.610259 env[1139]: 2024-12-13 14:33:46.607 [INFO][3920] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:33:46.614321 systemd[1]: run-netns-cni\x2d4446258a\x2d2f95\x2df996\x2d543c\x2de30b5ddf700f.mount: Deactivated successfully. Dec 13 14:33:46.618748 env[1139]: time="2024-12-13T14:33:46.618690378Z" level=info msg="TearDown network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" successfully" Dec 13 14:33:46.618818 env[1139]: time="2024-12-13T14:33:46.618746653Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" returns successfully" Dec 13 14:33:46.619719 env[1139]: time="2024-12-13T14:33:46.619684293Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-s8rc4,Uid:6329febd-f041-4c27-bc62-1c4625a32daa,Namespace:kube-system,Attempt:1,}" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.565 [INFO][3921] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.565 [INFO][3921] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" iface="eth0" netns="/var/run/netns/cni-63f0f43f-b7f0-d8ff-f6ce-4cb2a726ef29" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.566 [INFO][3921] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" iface="eth0" netns="/var/run/netns/cni-63f0f43f-b7f0-d8ff-f6ce-4cb2a726ef29" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.566 [INFO][3921] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" iface="eth0" netns="/var/run/netns/cni-63f0f43f-b7f0-d8ff-f6ce-4cb2a726ef29" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.566 [INFO][3921] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.566 [INFO][3921] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.666 [INFO][3937] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.667 [INFO][3937] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.667 [INFO][3937] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.678 [WARNING][3937] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.678 [INFO][3937] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.680 [INFO][3937] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:46.685786 env[1139]: 2024-12-13 14:33:46.682 [INFO][3921] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:33:46.687930 env[1139]: time="2024-12-13T14:33:46.686000515Z" level=info msg="TearDown network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" successfully" Dec 13 14:33:46.687930 env[1139]: time="2024-12-13T14:33:46.686053534Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" returns successfully" Dec 13 14:33:46.687930 env[1139]: time="2024-12-13T14:33:46.686946871Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-rgwl4,Uid:c32010a5-81f8-424b-881a-ee5399e44778,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:33:46.981392 systemd-networkd[970]: calied5617f61b4: Link UP Dec 13 14:33:46.985183 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:46.990542 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calied5617f61b4: link becomes ready Dec 13 14:33:46.990181 systemd-networkd[970]: calied5617f61b4: Gained carrier Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.777 [INFO][3965] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0 coredns-7db6d8ff4d- kube-system 6329febd-f041-4c27-bc62-1c4625a32daa 873 0 2024-12-13 14:32:48 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal coredns-7db6d8ff4d-s8rc4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calied5617f61b4 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.777 [INFO][3965] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.835 [INFO][3987] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" HandleID="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.878 [INFO][3987] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" HandleID="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b450), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"coredns-7db6d8ff4d-s8rc4", "timestamp":"2024-12-13 14:33:46.835758141 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.879 [INFO][3987] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.879 [INFO][3987] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.879 [INFO][3987] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.883 [INFO][3987] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.892 [INFO][3987] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.900 [INFO][3987] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.903 [INFO][3987] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.906 [INFO][3987] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.906 [INFO][3987] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.908 [INFO][3987] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.918 [INFO][3987] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.969 [INFO][3987] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.4/26] block=192.168.82.0/26 handle="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.969 [INFO][3987] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.4/26] handle="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.969 [INFO][3987] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:47.220100 env[1139]: 2024-12-13 14:33:46.969 [INFO][3987] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.4/26] IPv6=[] ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" HandleID="k8s-pod-network.69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:46.978 [INFO][3965] cni-plugin/k8s.go 386: Populated endpoint ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6329febd-f041-4c27-bc62-1c4625a32daa", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-s8rc4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied5617f61b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:46.978 [INFO][3965] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.4/32] ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:46.978 [INFO][3965] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calied5617f61b4 ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:46.996 [INFO][3965] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:47.001 [INFO][3965] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6329febd-f041-4c27-bc62-1c4625a32daa", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd", Pod:"coredns-7db6d8ff4d-s8rc4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied5617f61b4", MAC:"ba:f6:5e:10:b9:1a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:47.220966 env[1139]: 2024-12-13 14:33:47.215 [INFO][3965] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd" Namespace="kube-system" Pod="coredns-7db6d8ff4d-s8rc4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:33:47.227457 systemd-networkd[970]: cali8154b1c718a: Gained IPv6LL Dec 13 14:33:47.253000 audit[4014]: NETFILTER_CFG table=filter:105 family=2 entries=38 op=nft_register_chain pid=4014 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:47.257577 kernel: kauditd_printk_skb: 245 callbacks suppressed Dec 13 14:33:47.257640 kernel: audit: type=1325 audit(1734100427.253:1203): table=filter:105 family=2 entries=38 op=nft_register_chain pid=4014 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:47.253000 audit[4014]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffee38d6ad0 a2=0 a3=7ffee38d6abc items=0 ppid=3428 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.275167 kernel: audit: type=1300 audit(1734100427.253:1203): arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffee38d6ad0 a2=0 a3=7ffee38d6abc items=0 ppid=3428 pid=4014 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:47.275277 kernel: audit: type=1327 audit(1734100427.253:1203): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:47.253000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:47.533452 kubelet[2027]: I1213 14:33:47.533308 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-jkrrc" podStartSLOduration=59.533286157 podStartE2EDuration="59.533286157s" podCreationTimestamp="2024-12-13 14:32:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:47.446339087 +0000 UTC m=+71.291701418" watchObservedRunningTime="2024-12-13 14:33:47.533286157 +0000 UTC m=+71.378648457" Dec 13 14:33:47.568264 systemd[1]: run-netns-cni\x2d63f0f43f\x2db7f0\x2dd8ff\x2df6ce\x2d4cb2a726ef29.mount: Deactivated successfully. Dec 13 14:33:47.803598 systemd-networkd[970]: cali5a4fbb0a6d4: Gained IPv6LL Dec 13 14:33:47.951352 systemd-networkd[970]: cali81bdcb60bba: Link UP Dec 13 14:33:47.954841 systemd-networkd[970]: cali81bdcb60bba: Gained carrier Dec 13 14:33:47.955236 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali81bdcb60bba: link becomes ready Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:46.871 [INFO][3976] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0 calico-apiserver-858bcf457- calico-apiserver c32010a5-81f8-424b-881a-ee5399e44778 874 0 2024-12-13 14:32:56 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:858bcf457 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal calico-apiserver-858bcf457-rgwl4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali81bdcb60bba [] []}} ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:46.871 [INFO][3976] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:46.936 [INFO][3995] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" HandleID="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.536 [INFO][3995] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" HandleID="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000311930), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"calico-apiserver-858bcf457-rgwl4", "timestamp":"2024-12-13 14:33:46.936785508 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.536 [INFO][3995] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.536 [INFO][3995] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.536 [INFO][3995] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.541 [INFO][3995] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.559 [INFO][3995] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.567 [INFO][3995] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.570 [INFO][3995] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.574 [INFO][3995] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.574 [INFO][3995] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.578 [INFO][3995] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1 Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.614 [INFO][3995] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.732 [INFO][3995] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.5/26] block=192.168.82.0/26 handle="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.733 [INFO][3995] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.5/26] handle="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.733 [INFO][3995] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:48.017060 env[1139]: 2024-12-13 14:33:47.733 [INFO][3995] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.5/26] IPv6=[] ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" HandleID="k8s-pod-network.9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:47.737 [INFO][3976] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"c32010a5-81f8-424b-881a-ee5399e44778", ResourceVersion:"874", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"calico-apiserver-858bcf457-rgwl4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81bdcb60bba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:47.946 [INFO][3976] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.5/32] ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:47.947 [INFO][3976] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali81bdcb60bba ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:47.956 [INFO][3976] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:47.956 [INFO][3976] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"c32010a5-81f8-424b-881a-ee5399e44778", ResourceVersion:"874", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1", Pod:"calico-apiserver-858bcf457-rgwl4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81bdcb60bba", MAC:"b6:e3:c1:da:47:d6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:48.019381 env[1139]: 2024-12-13 14:33:48.014 [INFO][3976] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1" Namespace="calico-apiserver" Pod="calico-apiserver-858bcf457-rgwl4" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:33:48.052000 audit[4029]: NETFILTER_CFG table=filter:106 family=2 entries=52 op=nft_register_chain pid=4029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:48.057227 kernel: audit: type=1325 audit(1734100428.052:1204): table=filter:106 family=2 entries=52 op=nft_register_chain pid=4029 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:48.057368 kernel: audit: type=1300 audit(1734100428.052:1204): arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7ffdab853f20 a2=0 a3=7ffdab853f0c items=0 ppid=3428 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.052000 audit[4029]: SYSCALL arch=c000003e syscall=46 success=yes exit=26744 a0=3 a1=7ffdab853f20 a2=0 a3=7ffdab853f0c items=0 ppid=3428 pid=4029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.052000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:48.069178 kernel: audit: type=1327 audit(1734100428.052:1204): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:48.239777 env[1139]: time="2024-12-13T14:33:48.239606874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:48.239777 env[1139]: time="2024-12-13T14:33:48.239714335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:48.240534 env[1139]: time="2024-12-13T14:33:48.240183786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:48.241015 env[1139]: time="2024-12-13T14:33:48.240824297Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd pid=4040 runtime=io.containerd.runc.v2 Dec 13 14:33:48.289802 systemd[1]: run-containerd-runc-k8s.io-69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd-runc.zCi57B.mount: Deactivated successfully. Dec 13 14:33:48.293334 systemd[1]: Started cri-containerd-69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd.scope. Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.321184 kernel: audit: type=1400 audit(1734100428.313:1205): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.329518 kernel: audit: type=1400 audit(1734100428.313:1206): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.329673 kernel: audit: type=1400 audit(1734100428.313:1207): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.335934 kernel: audit: type=1400 audit(1734100428.313:1208): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.313000 audit: BPF prog-id=178 op=LOAD Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=4040 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623834636564663833633039613839306162376465636134323231 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=4040 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623834636564663833633039613839306162376465636134323231 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit: BPF prog-id=179 op=LOAD Dec 13 14:33:48.320000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0002122a0 items=0 ppid=4040 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623834636564663833633039613839306162376465636134323231 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit: BPF prog-id=180 op=LOAD Dec 13 14:33:48.320000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0002122e8 items=0 ppid=4040 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623834636564663833633039613839306162376465636134323231 Dec 13 14:33:48.320000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:33:48.320000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.320000 audit: BPF prog-id=181 op=LOAD Dec 13 14:33:48.320000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0002126f8 items=0 ppid=4040 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639623834636564663833633039613839306162376465636134323231 Dec 13 14:33:48.356453 env[1139]: time="2024-12-13T14:33:48.356401581Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:33:48.392569 env[1139]: time="2024-12-13T14:33:48.392444985Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-s8rc4,Uid:6329febd-f041-4c27-bc62-1c4625a32daa,Namespace:kube-system,Attempt:1,} returns sandbox id \"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd\"" Dec 13 14:33:48.429837 env[1139]: time="2024-12-13T14:33:48.429709249Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:48.429837 env[1139]: time="2024-12-13T14:33:48.429772407Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:48.429837 env[1139]: time="2024-12-13T14:33:48.429788597Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:48.430507 env[1139]: time="2024-12-13T14:33:48.430413500Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1 pid=4100 runtime=io.containerd.runc.v2 Dec 13 14:33:48.438664 env[1139]: time="2024-12-13T14:33:48.438614897Z" level=info msg="CreateContainer within sandbox \"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:33:48.443000 audit[4092]: NETFILTER_CFG table=filter:107 family=2 entries=16 op=nft_register_rule pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:48.444907 systemd-networkd[970]: calied5617f61b4: Gained IPv6LL Dec 13 14:33:48.443000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff5cd71480 a2=0 a3=7fff5cd7146c items=0 ppid=2206 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.443000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:48.466000 audit[4092]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:48.466000 audit[4092]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fff5cd71480 a2=0 a3=0 items=0 ppid=2206 pid=4092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.466000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:48.481864 systemd[1]: Started cri-containerd-9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1.scope. Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.509000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.509000 audit: BPF prog-id=182 op=LOAD Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4100 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961376635626264323935626237356265613233383738303335653530 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4100 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961376635626264323935626237356265613233383738303335653530 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit: BPF prog-id=183 op=LOAD Dec 13 14:33:48.510000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0001c4160 items=0 ppid=4100 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961376635626264323935626237356265613233383738303335653530 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.510000 audit: BPF prog-id=184 op=LOAD Dec 13 14:33:48.510000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0001c41a8 items=0 ppid=4100 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961376635626264323935626237356265613233383738303335653530 Dec 13 14:33:48.511000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:33:48.511000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:48.511000 audit: BPF prog-id=185 op=LOAD Dec 13 14:33:48.511000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0001c45b8 items=0 ppid=4100 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:48.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961376635626264323935626237356265613233383738303335653530 Dec 13 14:33:48.638180 env[1139]: time="2024-12-13T14:33:48.560829023Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-858bcf457-rgwl4,Uid:c32010a5-81f8-424b-881a-ee5399e44778,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1\"" Dec 13 14:33:48.680044 env[1139]: time="2024-12-13T14:33:48.680004948Z" level=info msg="CreateContainer within sandbox \"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:33:49.088269 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2421856948.mount: Deactivated successfully. Dec 13 14:33:49.101582 env[1139]: time="2024-12-13T14:33:49.101511417Z" level=info msg="CreateContainer within sandbox \"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f27c05a3e6c5700ea2ebefd4b2d204e0d2fc72ac7957dda1b32a8b9fe51bdcb9\"" Dec 13 14:33:49.102493 env[1139]: time="2024-12-13T14:33:49.102456138Z" level=info msg="StartContainer for \"f27c05a3e6c5700ea2ebefd4b2d204e0d2fc72ac7957dda1b32a8b9fe51bdcb9\"" Dec 13 14:33:49.110358 env[1139]: time="2024-12-13T14:33:49.110313189Z" level=info msg="CreateContainer within sandbox \"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"58d0d2264a877063fa9503f6e360e9679a40279cbce4873b47e75568c5088b23\"" Dec 13 14:33:49.111293 env[1139]: time="2024-12-13T14:33:49.111267690Z" level=info msg="StartContainer for \"58d0d2264a877063fa9503f6e360e9679a40279cbce4873b47e75568c5088b23\"" Dec 13 14:33:49.140586 systemd[1]: Started cri-containerd-f27c05a3e6c5700ea2ebefd4b2d204e0d2fc72ac7957dda1b32a8b9fe51bdcb9.scope. Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.173000 audit: BPF prog-id=186 op=LOAD Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632376330356133653663353730306561326562656664346232643230 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632376330356133653663353730306561326562656664346232643230 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit: BPF prog-id=187 op=LOAD Dec 13 14:33:49.174000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000255cf0 items=0 ppid=4100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632376330356133653663353730306561326562656664346232643230 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.174000 audit: BPF prog-id=188 op=LOAD Dec 13 14:33:49.174000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000255d38 items=0 ppid=4100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632376330356133653663353730306561326562656664346232643230 Dec 13 14:33:49.175000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:33:49.175000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.176000 audit: BPF prog-id=189 op=LOAD Dec 13 14:33:49.176000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ca148 items=0 ppid=4100 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.176000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632376330356133653663353730306561326562656664346232643230 Dec 13 14:33:49.259501 systemd[1]: Started cri-containerd-58d0d2264a877063fa9503f6e360e9679a40279cbce4873b47e75568c5088b23.scope. Dec 13 14:33:49.267105 env[1139]: time="2024-12-13T14:33:49.267060103Z" level=info msg="StartContainer for \"f27c05a3e6c5700ea2ebefd4b2d204e0d2fc72ac7957dda1b32a8b9fe51bdcb9\" returns successfully" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.098 [INFO][4083] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.101 [INFO][4083] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" iface="eth0" netns="/var/run/netns/cni-d35843be-d3f6-7deb-4dbe-155606852b73" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.101 [INFO][4083] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" iface="eth0" netns="/var/run/netns/cni-d35843be-d3f6-7deb-4dbe-155606852b73" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.102 [INFO][4083] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" iface="eth0" netns="/var/run/netns/cni-d35843be-d3f6-7deb-4dbe-155606852b73" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.102 [INFO][4083] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.102 [INFO][4083] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.225 [INFO][4141] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.226 [INFO][4141] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.226 [INFO][4141] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.259 [WARNING][4141] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.259 [INFO][4141] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.264 [INFO][4141] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:49.273970 env[1139]: 2024-12-13 14:33:49.271 [INFO][4083] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:33:49.275013 env[1139]: time="2024-12-13T14:33:49.274184378Z" level=info msg="TearDown network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" successfully" Dec 13 14:33:49.275013 env[1139]: time="2024-12-13T14:33:49.274225736Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" returns successfully" Dec 13 14:33:49.275563 env[1139]: time="2024-12-13T14:33:49.275517630Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ddccz,Uid:52f9b8f3-103b-4e3b-bfc8-f1b392cc9252,Namespace:calico-system,Attempt:1,}" Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.302000 audit: BPF prog-id=190 op=LOAD Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4040 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643064323236346138373730363366613935303366366533363065 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4040 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643064323236346138373730363366613935303366366533363065 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.303000 audit: BPF prog-id=191 op=LOAD Dec 13 14:33:49.303000 audit[4176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002003b0 items=0 ppid=4040 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643064323236346138373730363366613935303366366533363065 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit: BPF prog-id=192 op=LOAD Dec 13 14:33:49.304000 audit[4176]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002003f8 items=0 ppid=4040 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643064323236346138373730363366613935303366366533363065 Dec 13 14:33:49.304000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:33:49.304000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { perfmon } for pid=4176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit[4176]: AVC avc: denied { bpf } for pid=4176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.304000 audit: BPF prog-id=193 op=LOAD Dec 13 14:33:49.304000 audit[4176]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000200808 items=0 ppid=4040 pid=4176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538643064323236346138373730363366613935303366366533363065 Dec 13 14:33:49.339460 env[1139]: time="2024-12-13T14:33:49.339369066Z" level=info msg="StartContainer for \"58d0d2264a877063fa9503f6e360e9679a40279cbce4873b47e75568c5088b23\" returns successfully" Dec 13 14:33:49.403429 systemd-networkd[970]: cali81bdcb60bba: Gained IPv6LL Dec 13 14:33:49.559433 systemd[1]: run-netns-cni\x2dd35843be\x2dd3f6\x2d7deb\x2d4dbe\x2d155606852b73.mount: Deactivated successfully. Dec 13 14:33:49.581989 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:33:49.582108 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5eb3ebe6e06: link becomes ready Dec 13 14:33:49.579344 systemd-networkd[970]: cali5eb3ebe6e06: Link UP Dec 13 14:33:49.582158 systemd-networkd[970]: cali5eb3ebe6e06: Gained carrier Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.432 [INFO][4210] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0 csi-node-driver- calico-system 52f9b8f3-103b-4e3b-bfc8-f1b392cc9252 896 0 2024-12-13 14:32:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-6-7-e74dd619d7.novalocal csi-node-driver-ddccz eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali5eb3ebe6e06 [] []}} ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.434 [INFO][4210] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.504 [INFO][4234] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" HandleID="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.515 [INFO][4234] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" HandleID="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011a430), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-6-7-e74dd619d7.novalocal", "pod":"csi-node-driver-ddccz", "timestamp":"2024-12-13 14:33:49.504770246 +0000 UTC"}, Hostname:"ci-3510-3-6-7-e74dd619d7.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.516 [INFO][4234] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.516 [INFO][4234] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.516 [INFO][4234] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-6-7-e74dd619d7.novalocal' Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.519 [INFO][4234] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.524 [INFO][4234] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.531 [INFO][4234] ipam/ipam.go 489: Trying affinity for 192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.533 [INFO][4234] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.538 [INFO][4234] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.0/26 host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.539 [INFO][4234] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.0/26 handle="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.541 [INFO][4234] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.547 [INFO][4234] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.0/26 handle="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.565 [INFO][4234] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.6/26] block=192.168.82.0/26 handle="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.566 [INFO][4234] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.6/26] handle="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" host="ci-3510-3-6-7-e74dd619d7.novalocal" Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.566 [INFO][4234] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:33:49.603150 env[1139]: 2024-12-13 14:33:49.566 [INFO][4234] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.6/26] IPv6=[] ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" HandleID="k8s-pod-network.5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.569 [INFO][4210] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"", Pod:"csi-node-driver-ddccz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5eb3ebe6e06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.569 [INFO][4210] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.6/32] ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.569 [INFO][4210] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5eb3ebe6e06 ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.582 [INFO][4210] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.583 [INFO][4210] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f", Pod:"csi-node-driver-ddccz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5eb3ebe6e06", MAC:"ea:ab:f3:69:52:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:33:49.604030 env[1139]: 2024-12-13 14:33:49.601 [INFO][4210] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f" Namespace="calico-system" Pod="csi-node-driver-ddccz" WorkloadEndpoint="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:33:49.624408 env[1139]: time="2024-12-13T14:33:49.624179998Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:33:49.624408 env[1139]: time="2024-12-13T14:33:49.624279595Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:33:49.624408 env[1139]: time="2024-12-13T14:33:49.624313769Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:33:49.625157 env[1139]: time="2024-12-13T14:33:49.624675788Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f pid=4263 runtime=io.containerd.runc.v2 Dec 13 14:33:49.653000 audit[4277]: NETFILTER_CFG table=filter:109 family=2 entries=52 op=nft_register_chain pid=4277 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:33:49.656399 systemd[1]: Started cri-containerd-5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f.scope. Dec 13 14:33:49.653000 audit[4277]: SYSCALL arch=c000003e syscall=46 success=yes exit=25040 a0=3 a1=7ffd5ae308a0 a2=0 a3=7ffd5ae3088c items=0 ppid=3428 pid=4277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.653000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.705000 audit: BPF prog-id=194 op=LOAD Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4263 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303434383334633830386563656634353934353235306633626235 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4263 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303434383334633830386563656634353934353235306633626235 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit: BPF prog-id=195 op=LOAD Dec 13 14:33:49.706000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00030e6c0 items=0 ppid=4263 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303434383334633830386563656634353934353235306633626235 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit: BPF prog-id=196 op=LOAD Dec 13 14:33:49.706000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00030e708 items=0 ppid=4263 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303434383334633830386563656634353934353235306633626235 Dec 13 14:33:49.706000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:33:49.706000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { perfmon } for pid=4272 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit[4272]: AVC avc: denied { bpf } for pid=4272 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:49.706000 audit: BPF prog-id=197 op=LOAD Dec 13 14:33:49.706000 audit[4272]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00030eb18 items=0 ppid=4263 pid=4272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:49.706000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564303434383334633830386563656634353934353235306633626235 Dec 13 14:33:49.744303 env[1139]: time="2024-12-13T14:33:49.744243106Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-ddccz,Uid:52f9b8f3-103b-4e3b-bfc8-f1b392cc9252,Namespace:calico-system,Attempt:1,} returns sandbox id \"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f\"" Dec 13 14:33:50.105105 kubelet[2027]: I1213 14:33:50.105019 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-s8rc4" podStartSLOduration=62.104972121 podStartE2EDuration="1m2.104972121s" podCreationTimestamp="2024-12-13 14:32:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:50.104013964 +0000 UTC m=+73.949376284" watchObservedRunningTime="2024-12-13 14:33:50.104972121 +0000 UTC m=+73.950334431" Dec 13 14:33:50.154000 audit[4299]: NETFILTER_CFG table=filter:110 family=2 entries=13 op=nft_register_rule pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:50.154000 audit[4299]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe288e9cd0 a2=0 a3=7ffe288e9cbc items=0 ppid=2206 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:50.154000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:50.161873 kubelet[2027]: I1213 14:33:50.161808 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-858bcf457-rgwl4" podStartSLOduration=54.161773949 podStartE2EDuration="54.161773949s" podCreationTimestamp="2024-12-13 14:32:56 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:33:50.135221894 +0000 UTC m=+73.980584224" watchObservedRunningTime="2024-12-13 14:33:50.161773949 +0000 UTC m=+74.007136249" Dec 13 14:33:50.171000 audit[4299]: NETFILTER_CFG table=nat:111 family=2 entries=35 op=nft_register_chain pid=4299 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:50.171000 audit[4299]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe288e9cd0 a2=0 a3=7ffe288e9cbc items=0 ppid=2206 pid=4299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:50.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:50.502000 audit[4302]: NETFILTER_CFG table=filter:112 family=2 entries=10 op=nft_register_rule pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:50.502000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffc08ed040 a2=0 a3=7fffc08ed02c items=0 ppid=2206 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:50.502000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:50.731000 audit[4302]: NETFILTER_CFG table=nat:113 family=2 entries=56 op=nft_register_chain pid=4302 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:50.731000 audit[4302]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fffc08ed040 a2=0 a3=7fffc08ed02c items=0 ppid=2206 pid=4302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:50.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:51.579328 systemd-networkd[970]: cali5eb3ebe6e06: Gained IPv6LL Dec 13 14:33:51.869000 audit[4170]: AVC avc: denied { watch } for pid=4170 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.1138924832/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c488,c812 tclass=file permissive=0 Dec 13 14:33:51.869000 audit[4170]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00203e400 a2=fc6 a3=0 items=0 ppid=4100 pid=4170 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 key=(null) Dec 13 14:33:51.869000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:33:51.942252 env[1139]: time="2024-12-13T14:33:51.942194487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:51.949456 env[1139]: time="2024-12-13T14:33:51.949387393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:51.952655 env[1139]: time="2024-12-13T14:33:51.952605380Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:51.954999 env[1139]: time="2024-12-13T14:33:51.954961520Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:51.955798 env[1139]: time="2024-12-13T14:33:51.955733028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:33:51.957777 env[1139]: time="2024-12-13T14:33:51.957738871Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:33:51.996000 audit[4309]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:51.996000 audit[4309]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc42d09da0 a2=0 a3=7ffc42d09d8c items=0 ppid=2206 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:51.996000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:52.007000 audit[4309]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4309 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:52.007000 audit[4309]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc42d09da0 a2=0 a3=7ffc42d09d8c items=0 ppid=2206 pid=4309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.007000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:52.021236 env[1139]: time="2024-12-13T14:33:52.020070774Z" level=info msg="CreateContainer within sandbox \"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:33:52.063991 env[1139]: time="2024-12-13T14:33:52.063941291Z" level=info msg="CreateContainer within sandbox \"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e\"" Dec 13 14:33:52.064665 env[1139]: time="2024-12-13T14:33:52.064637046Z" level=info msg="StartContainer for \"bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e\"" Dec 13 14:33:52.095909 systemd[1]: Started cri-containerd-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e.scope. Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.223000 audit: BPF prog-id=198 op=LOAD Dec 13 14:33:52.225000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.225000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3817 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265663731373963383839623362353936323765343238396537613866 Dec 13 14:33:52.226000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.226000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3817 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265663731373963383839623362353936323765343238396537613866 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.227000 audit: BPF prog-id=199 op=LOAD Dec 13 14:33:52.227000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000269d90 items=0 ppid=3817 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265663731373963383839623362353936323765343238396537613866 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.229000 audit: BPF prog-id=200 op=LOAD Dec 13 14:33:52.229000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000269dd8 items=0 ppid=3817 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265663731373963383839623362353936323765343238396537613866 Dec 13 14:33:52.231000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:33:52.231000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { perfmon } for pid=4319 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit[4319]: AVC avc: denied { bpf } for pid=4319 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:52.233000 audit: BPF prog-id=201 op=LOAD Dec 13 14:33:52.233000 audit[4319]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c81e8 items=0 ppid=3817 pid=4319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:52.233000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265663731373963383839623362353936323765343238396537613866 Dec 13 14:33:52.298765 env[1139]: time="2024-12-13T14:33:52.298703265Z" level=info msg="StartContainer for \"bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e\" returns successfully" Dec 13 14:33:53.168688 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.2LlbAR.mount: Deactivated successfully. Dec 13 14:33:53.235248 kubelet[2027]: I1213 14:33:53.235156 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85c677f955-rrnxr" podStartSLOduration=50.463676768 podStartE2EDuration="56.23514101s" podCreationTimestamp="2024-12-13 14:32:57 +0000 UTC" firstStartedPulling="2024-12-13 14:33:46.186023498 +0000 UTC m=+70.031385808" lastFinishedPulling="2024-12-13 14:33:51.95748774 +0000 UTC m=+75.802850050" observedRunningTime="2024-12-13 14:33:53.168017609 +0000 UTC m=+77.013379929" watchObservedRunningTime="2024-12-13 14:33:53.23514101 +0000 UTC m=+77.080503310" Dec 13 14:33:54.443502 env[1139]: time="2024-12-13T14:33:54.443448093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.446654 env[1139]: time="2024-12-13T14:33:54.446616578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.449218 env[1139]: time="2024-12-13T14:33:54.449171330Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.451824 env[1139]: time="2024-12-13T14:33:54.451784703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:54.452508 env[1139]: time="2024-12-13T14:33:54.452467945Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:33:54.457244 env[1139]: time="2024-12-13T14:33:54.457200093Z" level=info msg="CreateContainer within sandbox \"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:33:54.486025 env[1139]: time="2024-12-13T14:33:54.485270396Z" level=info msg="CreateContainer within sandbox \"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"7f6ced52b76dc264992e8964a75d779fc677735dcff027611d8dbb7363ae39b0\"" Dec 13 14:33:54.487191 env[1139]: time="2024-12-13T14:33:54.486701250Z" level=info msg="StartContainer for \"7f6ced52b76dc264992e8964a75d779fc677735dcff027611d8dbb7363ae39b0\"" Dec 13 14:33:54.511911 systemd[1]: Started cri-containerd-7f6ced52b76dc264992e8964a75d779fc677735dcff027611d8dbb7363ae39b0.scope. Dec 13 14:33:54.521654 systemd[1]: run-containerd-runc-k8s.io-7f6ced52b76dc264992e8964a75d779fc677735dcff027611d8dbb7363ae39b0-runc.xEfI3P.mount: Deactivated successfully. Dec 13 14:33:54.555522 kernel: kauditd_printk_skb: 368 callbacks suppressed Dec 13 14:33:54.555686 kernel: audit: type=1400 audit(1734100434.549:1323): avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.562032 kernel: audit: type=1300 audit(1734100434.549:1323): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f45981e22f8 items=0 ppid=4263 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.549000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f45981e22f8 items=0 ppid=4263 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766366365643532623736646332363439393265383936346137356437 Dec 13 14:33:54.567131 kernel: audit: type=1327 audit(1734100434.549:1323): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766366365643532623736646332363439393265383936346137356437 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.574182 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.582147 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.586140 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.591157 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.597145 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.597196 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.604259 kernel: audit: type=1400 audit(1734100434.549:1324): avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.549000 audit: BPF prog-id=202 op=LOAD Dec 13 14:33:54.549000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000240b8 items=0 ppid=4263 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.549000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766366365643532623736646332363439393265383936346137356437 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit: BPF prog-id=203 op=LOAD Dec 13 14:33:54.554000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024108 items=0 ppid=4263 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766366365643532623736646332363439393265383936346137356437 Dec 13 14:33:54.554000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:33:54.554000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { perfmon } for pid=4373 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit[4373]: AVC avc: denied { bpf } for pid=4373 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:54.554000 audit: BPF prog-id=204 op=LOAD Dec 13 14:33:54.554000 audit[4373]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024198 items=0 ppid=4263 pid=4373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:54.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766366365643532623736646332363439393265383936346137356437 Dec 13 14:33:54.609056 env[1139]: time="2024-12-13T14:33:54.609020794Z" level=info msg="StartContainer for \"7f6ced52b76dc264992e8964a75d779fc677735dcff027611d8dbb7363ae39b0\" returns successfully" Dec 13 14:33:54.611876 env[1139]: time="2024-12-13T14:33:54.611831378Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:33:56.691923 env[1139]: time="2024-12-13T14:33:56.691882675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:56.697895 env[1139]: time="2024-12-13T14:33:56.697870408Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:56.700975 env[1139]: time="2024-12-13T14:33:56.700952310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:56.703781 env[1139]: time="2024-12-13T14:33:56.703758986Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:33:56.704530 env[1139]: time="2024-12-13T14:33:56.704504775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:33:56.707562 env[1139]: time="2024-12-13T14:33:56.707524270Z" level=info msg="CreateContainer within sandbox \"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:33:56.738810 env[1139]: time="2024-12-13T14:33:56.738759611Z" level=info msg="CreateContainer within sandbox \"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"695f9fa41ed492f458da4793af970081f1872d9df9d93d6532b0d9a0b7198579\"" Dec 13 14:33:56.739758 env[1139]: time="2024-12-13T14:33:56.739721374Z" level=info msg="StartContainer for \"695f9fa41ed492f458da4793af970081f1872d9df9d93d6532b0d9a0b7198579\"" Dec 13 14:33:56.771922 systemd[1]: run-containerd-runc-k8s.io-695f9fa41ed492f458da4793af970081f1872d9df9d93d6532b0d9a0b7198579-runc.PwVtFr.mount: Deactivated successfully. Dec 13 14:33:56.775891 systemd[1]: Started cri-containerd-695f9fa41ed492f458da4793af970081f1872d9df9d93d6532b0d9a0b7198579.scope. Dec 13 14:33:56.800331 kubelet[2027]: I1213 14:33:56.773417 2027 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9e6c32d6c8 items=0 ppid=4263 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639356639666134316564343932663435386461343739336166393730 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.813000 audit: BPF prog-id=205 op=LOAD Dec 13 14:33:56.813000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002cdba8 items=0 ppid=4263 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639356639666134316564343932663435386461343739336166393730 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.815000 audit: BPF prog-id=206 op=LOAD Dec 13 14:33:56.815000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002cdbf8 items=0 ppid=4263 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639356639666134316564343932663435386461343739336166393730 Dec 13 14:33:56.815000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:33:56.816000 audit: BPF prog-id=205 op=UNLOAD Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { perfmon } for pid=4408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit[4408]: AVC avc: denied { bpf } for pid=4408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:33:56.816000 audit: BPF prog-id=207 op=LOAD Dec 13 14:33:56.816000 audit[4408]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002cdc88 items=0 ppid=4263 pid=4408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.816000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639356639666134316564343932663435386461343739336166393730 Dec 13 14:33:56.843849 env[1139]: time="2024-12-13T14:33:56.843806648Z" level=info msg="StartContainer for \"695f9fa41ed492f458da4793af970081f1872d9df9d93d6532b0d9a0b7198579\" returns successfully" Dec 13 14:33:56.886000 audit[4434]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=4434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:56.886000 audit[4434]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd959f75d0 a2=0 a3=7ffd959f75bc items=0 ppid=2206 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.886000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:56.891000 audit[4434]: NETFILTER_CFG table=nat:117 family=2 entries=34 op=nft_register_chain pid=4434 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:33:56.891000 audit[4434]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd959f75d0 a2=0 a3=7ffd959f75bc items=0 ppid=2206 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:33:56.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:33:57.153872 kubelet[2027]: I1213 14:33:57.153675 2027 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-ddccz" podStartSLOduration=53.193690087 podStartE2EDuration="1m0.153603032s" podCreationTimestamp="2024-12-13 14:32:57 +0000 UTC" firstStartedPulling="2024-12-13 14:33:49.745829853 +0000 UTC m=+73.591192163" lastFinishedPulling="2024-12-13 14:33:56.705742798 +0000 UTC m=+80.551105108" observedRunningTime="2024-12-13 14:33:57.153189325 +0000 UTC m=+80.998551635" watchObservedRunningTime="2024-12-13 14:33:57.153603032 +0000 UTC m=+80.998965382" Dec 13 14:33:57.631148 kubelet[2027]: I1213 14:33:57.629225 2027 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:33:57.633946 kubelet[2027]: I1213 14:33:57.633928 2027 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:34:03.301499 systemd[1]: Started sshd@9-172.24.4.208:22-172.24.4.1:58726.service. Dec 13 14:34:03.313525 kernel: kauditd_printk_skb: 82 callbacks suppressed Dec 13 14:34:03.313788 kernel: audit: type=1130 audit(1734100443.303:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.208:22-172.24.4.1:58726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:03.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.208:22-172.24.4.1:58726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:04.687000 audit[4454]: USER_ACCT pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.696786 kernel: audit: type=1101 audit(1734100444.687:1338): pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.696845 sshd[4454]: Accepted publickey for core from 172.24.4.1 port 58726 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:04.704044 kernel: audit: type=1103 audit(1734100444.695:1339): pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.695000 audit[4454]: CRED_ACQ pid=4454 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.707387 sshd[4454]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:04.708909 kernel: audit: type=1006 audit(1734100444.695:1340): pid=4454 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:34:04.713823 kernel: audit: type=1300 audit(1734100444.695:1340): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb32cd90 a2=3 a3=0 items=0 ppid=1 pid=4454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.695000 audit[4454]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffeb32cd90 a2=3 a3=0 items=0 ppid=1 pid=4454 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:04.717752 kernel: audit: type=1327 audit(1734100444.695:1340): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:04.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:04.726437 systemd[1]: Started session-10.scope. Dec 13 14:34:04.728455 systemd-logind[1129]: New session 10 of user core. Dec 13 14:34:04.735000 audit[4454]: USER_START pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.742211 kernel: audit: type=1105 audit(1734100444.735:1341): pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.746876 kernel: audit: type=1103 audit(1734100444.741:1342): pid=4456 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:04.741000 audit[4456]: CRED_ACQ pid=4456 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:07.174996 sshd[4454]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:07.175000 audit[4454]: USER_END pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:07.177872 systemd[1]: sshd@9-172.24.4.208:22-172.24.4.1:58726.service: Deactivated successfully. Dec 13 14:34:07.178797 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:34:07.189150 kernel: audit: type=1106 audit(1734100447.175:1343): pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:07.190548 systemd-logind[1129]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:34:07.175000 audit[4454]: CRED_DISP pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:07.209162 kernel: audit: type=1104 audit(1734100447.175:1344): pid=4454 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:07.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.208:22-172.24.4.1:58726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:07.211017 systemd-logind[1129]: Removed session 10. Dec 13 14:34:12.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.208:22-172.24.4.1:56466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:12.208505 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:34:12.208762 kernel: audit: type=1130 audit(1734100452.187:1346): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.208:22-172.24.4.1:56466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:12.188058 systemd[1]: Started sshd@10-172.24.4.208:22-172.24.4.1:56466.service. Dec 13 14:34:13.446962 sshd[4474]: Accepted publickey for core from 172.24.4.1 port 56466 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:13.445000 audit[4474]: USER_ACCT pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.459166 kernel: audit: type=1101 audit(1734100453.445:1347): pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.457000 audit[4474]: CRED_ACQ pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.522417 kernel: audit: type=1103 audit(1734100453.457:1348): pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.522607 kernel: audit: type=1006 audit(1734100453.458:1349): pid=4474 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:34:13.522709 kernel: audit: type=1300 audit(1734100453.458:1349): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37b64a10 a2=3 a3=0 items=0 ppid=1 pid=4474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:13.522800 kernel: audit: type=1327 audit(1734100453.458:1349): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:13.522883 kernel: audit: type=1105 audit(1734100453.513:1350): pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.590030 kernel: audit: type=1103 audit(1734100453.517:1351): pid=4476 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.458000 audit[4474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37b64a10 a2=3 a3=0 items=0 ppid=1 pid=4474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:13.458000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:13.513000 audit[4474]: USER_START pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.517000 audit[4476]: CRED_ACQ pid=4476 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:13.459931 sshd[4474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:13.500525 systemd[1]: Started session-11.scope. Dec 13 14:34:13.500930 systemd-logind[1129]: New session 11 of user core. Dec 13 14:34:14.426391 sshd[4474]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:14.427000 audit[4474]: USER_END pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:14.432235 systemd[1]: sshd@10-172.24.4.208:22-172.24.4.1:56466.service: Deactivated successfully. Dec 13 14:34:14.433793 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:34:14.441232 kernel: audit: type=1106 audit(1734100454.427:1352): pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:14.427000 audit[4474]: CRED_DISP pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:14.453843 systemd-logind[1129]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:34:14.454304 kernel: audit: type=1104 audit(1734100454.427:1353): pid=4474 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:14.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.208:22-172.24.4.1:56466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:14.457026 systemd-logind[1129]: Removed session 11. Dec 13 14:34:16.617571 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.rqg325.mount: Deactivated successfully. Dec 13 14:34:19.431939 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:34:19.432242 kernel: audit: type=1130 audit(1734100459.428:1355): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.208:22-172.24.4.1:35674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.208:22-172.24.4.1:35674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:19.429390 systemd[1]: Started sshd@11-172.24.4.208:22-172.24.4.1:35674.service. Dec 13 14:34:19.931989 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.Rm4CzO.mount: Deactivated successfully. Dec 13 14:34:21.033000 audit[4513]: USER_ACCT pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.035482 sshd[4513]: Accepted publickey for core from 172.24.4.1 port 35674 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:21.040206 kernel: audit: type=1101 audit(1734100461.033:1356): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.040000 audit[4513]: CRED_ACQ pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.044195 sshd[4513]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:21.052195 kernel: audit: type=1103 audit(1734100461.040:1357): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.066941 kernel: audit: type=1006 audit(1734100461.040:1358): pid=4513 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:34:21.072282 kernel: audit: type=1300 audit(1734100461.040:1358): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffcbb4820 a2=3 a3=0 items=0 ppid=1 pid=4513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.072393 kernel: audit: type=1327 audit(1734100461.040:1358): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:21.040000 audit[4513]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffcbb4820 a2=3 a3=0 items=0 ppid=1 pid=4513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:21.040000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:21.083304 systemd-logind[1129]: New session 12 of user core. Dec 13 14:34:21.084777 systemd[1]: Started session-12.scope. Dec 13 14:34:21.097000 audit[4513]: USER_START pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.100000 audit[4537]: CRED_ACQ pid=4537 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.120764 kernel: audit: type=1105 audit(1734100461.097:1359): pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.120890 kernel: audit: type=1103 audit(1734100461.100:1360): pid=4537 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.918899 sshd[4513]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:21.921000 audit[4513]: USER_END pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.937308 kernel: audit: type=1106 audit(1734100461.921:1361): pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.938463 systemd[1]: sshd@11-172.24.4.208:22-172.24.4.1:35674.service: Deactivated successfully. Dec 13 14:34:21.941707 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:34:21.945010 systemd-logind[1129]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:34:21.947937 systemd-logind[1129]: Removed session 12. Dec 13 14:34:21.921000 audit[4513]: CRED_DISP pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.961150 kernel: audit: type=1104 audit(1734100461.921:1362): pid=4513 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:21.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.208:22-172.24.4.1:35674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:26.933764 systemd[1]: Started sshd@12-172.24.4.208:22-172.24.4.1:34366.service. Dec 13 14:34:26.934000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.208:22-172.24.4.1:34366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:26.938662 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:34:26.938833 kernel: audit: type=1130 audit(1734100466.934:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.208:22-172.24.4.1:34366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:28.120000 audit[4548]: USER_ACCT pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.123795 sshd[4548]: Accepted publickey for core from 172.24.4.1 port 34366 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:28.133190 kernel: audit: type=1101 audit(1734100468.120:1365): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.134000 audit[4548]: CRED_ACQ pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.147180 kernel: audit: type=1103 audit(1734100468.134:1366): pid=4548 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.135000 audit[4548]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e747d60 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.165382 kernel: audit: type=1006 audit(1734100468.135:1367): pid=4548 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:34:28.165505 kernel: audit: type=1300 audit(1734100468.135:1367): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e747d60 a2=3 a3=0 items=0 ppid=1 pid=4548 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:28.135000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:28.168086 sshd[4548]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:28.162000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:28.181029 kernel: audit: type=1327 audit(1734100468.135:1367): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:28.185620 kernel: audit: type=1400 audit(1734100468.162:1368): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:28.185752 kernel: audit: type=1300 audit(1734100468.162:1368): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001023b80 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:28.162000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001023b80 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:28.162000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:28.206158 kernel: audit: type=1327 audit(1734100468.162:1368): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:28.162000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:28.215274 kernel: audit: type=1400 audit(1734100468.162:1369): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:28.162000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00248b350 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:28.162000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:28.219182 systemd-logind[1129]: New session 13 of user core. Dec 13 14:34:28.221774 systemd[1]: Started session-13.scope. Dec 13 14:34:28.228000 audit[4548]: USER_START pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.230000 audit[4550]: CRED_ACQ pid=4550 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.974229 sshd[4548]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:28.979000 audit[4548]: USER_END pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.979000 audit[4548]: CRED_DISP pid=4548 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:28.985072 systemd[1]: Started sshd@13-172.24.4.208:22-172.24.4.1:34378.service. Dec 13 14:34:28.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.208:22-172.24.4.1:34378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:28.994506 systemd[1]: sshd@12-172.24.4.208:22-172.24.4.1:34366.service: Deactivated successfully. Dec 13 14:34:28.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.208:22-172.24.4.1:34366 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:28.996335 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:34:29.000047 systemd-logind[1129]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:34:29.003852 systemd-logind[1129]: Removed session 13. Dec 13 14:34:29.207000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.207000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.207000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0097a8a80 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:29.207000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c003dfefa0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:29.213000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.213000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c004867470 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:29.220000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.220000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c009e56000 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:29.223000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.223000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0048679e0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:29.223000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:29.223000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0030b89c0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:34:29.223000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:34:30.290000 audit[4559]: USER_ACCT pid=4559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:30.293030 sshd[4559]: Accepted publickey for core from 172.24.4.1 port 34378 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:30.295000 audit[4559]: CRED_ACQ pid=4559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:30.295000 audit[4559]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd27d6fd70 a2=3 a3=0 items=0 ppid=1 pid=4559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:30.295000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:30.297505 sshd[4559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:30.311422 systemd-logind[1129]: New session 14 of user core. Dec 13 14:34:30.312436 systemd[1]: Started session-14.scope. Dec 13 14:34:30.326000 audit[4559]: USER_START pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:30.330000 audit[4564]: CRED_ACQ pid=4564 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:31.211062 sshd[4559]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:31.211000 audit[4559]: USER_END pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:31.211000 audit[4559]: CRED_DISP pid=4559 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:31.216094 systemd[1]: sshd@13-172.24.4.208:22-172.24.4.1:34378.service: Deactivated successfully. Dec 13 14:34:31.216000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.208:22-172.24.4.1:34378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:31.218634 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:34:31.220026 systemd-logind[1129]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:34:31.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.208:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:31.223004 systemd[1]: Started sshd@14-172.24.4.208:22-172.24.4.1:34380.service. Dec 13 14:34:31.226489 systemd-logind[1129]: Removed session 14. Dec 13 14:34:32.541000 audit[4572]: USER_ACCT pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.585797 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 14:34:32.585999 kernel: audit: type=1101 audit(1734100472.541:1391): pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.586086 kernel: audit: type=1103 audit(1734100472.556:1392): pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.586205 kernel: audit: type=1006 audit(1734100472.557:1393): pid=4572 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:34:32.586275 kernel: audit: type=1300 audit(1734100472.557:1393): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f080b70 a2=3 a3=0 items=0 ppid=1 pid=4572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.556000 audit[4572]: CRED_ACQ pid=4572 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.557000 audit[4572]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f080b70 a2=3 a3=0 items=0 ppid=1 pid=4572 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:32.558957 sshd[4572]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:32.587599 sshd[4572]: Accepted publickey for core from 172.24.4.1 port 34380 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:32.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:32.604096 kernel: audit: type=1327 audit(1734100472.557:1393): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:32.600822 systemd-logind[1129]: New session 15 of user core. Dec 13 14:34:32.601469 systemd[1]: Started session-15.scope. Dec 13 14:34:32.616000 audit[4572]: USER_START pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.631000 audit[4574]: CRED_ACQ pid=4574 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.642227 kernel: audit: type=1105 audit(1734100472.616:1394): pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:32.642485 kernel: audit: type=1103 audit(1734100472.631:1395): pid=4574 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:33.320575 sshd[4572]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:33.322000 audit[4572]: USER_END pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:33.336179 kernel: audit: type=1106 audit(1734100473.322:1396): pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:33.336077 systemd[1]: sshd@14-172.24.4.208:22-172.24.4.1:34380.service: Deactivated successfully. Dec 13 14:34:33.337769 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:34:33.322000 audit[4572]: CRED_DISP pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:33.335000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.208:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.349541 systemd-logind[1129]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:34:33.351992 systemd-logind[1129]: Removed session 15. Dec 13 14:34:33.358246 kernel: audit: type=1104 audit(1734100473.322:1397): pid=4572 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:33.358488 kernel: audit: type=1131 audit(1734100473.335:1398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.208:22-172.24.4.1:34380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.678016 env[1139]: time="2024-12-13T14:34:36.677649375Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:34:38.335619 systemd[1]: Started sshd@15-172.24.4.208:22-172.24.4.1:35406.service. Dec 13 14:34:38.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.208:22-172.24.4.1:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:38.348368 kernel: audit: type=1130 audit(1734100478.335:1399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.208:22-172.24.4.1:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:37.002 [WARNING][4598] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"c32010a5-81f8-424b-881a-ee5399e44778", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1", Pod:"calico-apiserver-858bcf457-rgwl4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81bdcb60bba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:37.010 [INFO][4598] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:37.010 [INFO][4598] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" iface="eth0" netns="" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:37.010 [INFO][4598] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:37.010 [INFO][4598] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.562 [INFO][4604] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.577 [INFO][4604] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.577 [INFO][4604] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.620 [WARNING][4604] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.620 [INFO][4604] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.626 [INFO][4604] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:38.634634 env[1139]: 2024-12-13 14:34:38.629 [INFO][4598] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:38.634634 env[1139]: time="2024-12-13T14:34:38.634283615Z" level=info msg="TearDown network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" successfully" Dec 13 14:34:38.634634 env[1139]: time="2024-12-13T14:34:38.634348276Z" level=info msg="StopPodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" returns successfully" Dec 13 14:34:38.696888 env[1139]: time="2024-12-13T14:34:38.696507227Z" level=info msg="RemovePodSandbox for \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:34:38.696888 env[1139]: time="2024-12-13T14:34:38.696594430Z" level=info msg="Forcibly stopping sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\"" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:38.978 [WARNING][4628] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"c32010a5-81f8-424b-881a-ee5399e44778", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"9a7f5bbd295bb75bea23878035e507cee34a0ada2554c098232a2d5aec480ec1", Pod:"calico-apiserver-858bcf457-rgwl4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali81bdcb60bba", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:38.979 [INFO][4628] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:38.979 [INFO][4628] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" iface="eth0" netns="" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:38.979 [INFO][4628] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:38.979 [INFO][4628] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.058 [INFO][4634] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.059 [INFO][4634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.059 [INFO][4634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.090 [WARNING][4634] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.090 [INFO][4634] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" HandleID="k8s-pod-network.1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--rgwl4-eth0" Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.094 [INFO][4634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.106087 env[1139]: 2024-12-13 14:34:39.101 [INFO][4628] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3" Dec 13 14:34:39.111087 env[1139]: time="2024-12-13T14:34:39.107930562Z" level=info msg="TearDown network for sandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" successfully" Dec 13 14:34:39.197511 env[1139]: time="2024-12-13T14:34:39.197400396Z" level=info msg="RemovePodSandbox \"1924e4b0eafee4ba48e5ee42fe3224c547b595a17d9311c00bcb9863d65c13b3\" returns successfully" Dec 13 14:34:39.209746 env[1139]: time="2024-12-13T14:34:39.209639204Z" level=info msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.294 [WARNING][4654] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0198917-c198-4186-9464-1c68de05f597", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36", Pod:"calico-apiserver-858bcf457-pvlkh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali90ce1a60c27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.351 [INFO][4654] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.351 [INFO][4654] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" iface="eth0" netns="" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.351 [INFO][4654] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.351 [INFO][4654] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.392 [INFO][4660] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.392 [INFO][4660] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.392 [INFO][4660] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.408 [WARNING][4660] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.408 [INFO][4660] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.411 [INFO][4660] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.416784 env[1139]: 2024-12-13 14:34:39.413 [INFO][4654] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.420569 env[1139]: time="2024-12-13T14:34:39.416832049Z" level=info msg="TearDown network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" successfully" Dec 13 14:34:39.420569 env[1139]: time="2024-12-13T14:34:39.416887574Z" level=info msg="StopPodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" returns successfully" Dec 13 14:34:39.420569 env[1139]: time="2024-12-13T14:34:39.417911474Z" level=info msg="RemovePodSandbox for \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" Dec 13 14:34:39.420569 env[1139]: time="2024-12-13T14:34:39.417972038Z" level=info msg="Forcibly stopping sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\"" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.529 [WARNING][4681] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0", GenerateName:"calico-apiserver-858bcf457-", Namespace:"calico-apiserver", SelfLink:"", UID:"d0198917-c198-4186-9464-1c68de05f597", ResourceVersion:"974", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 56, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"858bcf457", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"c5a90ec8b0171610a915f466ab539a7aebcc8d42a72759bb5363e16cf5417e36", Pod:"calico-apiserver-858bcf457-pvlkh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali90ce1a60c27", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.530 [INFO][4681] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.530 [INFO][4681] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" iface="eth0" netns="" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.530 [INFO][4681] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.530 [INFO][4681] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.560 [INFO][4687] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.560 [INFO][4687] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.560 [INFO][4687] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.572 [WARNING][4687] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.572 [INFO][4687] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" HandleID="k8s-pod-network.5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--apiserver--858bcf457--pvlkh-eth0" Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.574 [INFO][4687] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.579842 env[1139]: 2024-12-13 14:34:39.577 [INFO][4681] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a" Dec 13 14:34:39.583314 env[1139]: time="2024-12-13T14:34:39.579910753Z" level=info msg="TearDown network for sandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" successfully" Dec 13 14:34:39.647790 env[1139]: time="2024-12-13T14:34:39.647673536Z" level=info msg="RemovePodSandbox \"5b1d4ce542655b204adf660e55f4baf68f6f5d28afbb9002c45fc73254a82d6a\" returns successfully" Dec 13 14:34:39.650002 env[1139]: time="2024-12-13T14:34:39.649926643Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.747 [WARNING][4706] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a23f1496-d17b-4daa-ae28-d51655ac4da7", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b", Pod:"coredns-7db6d8ff4d-jkrrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8154b1c718a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.747 [INFO][4706] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.747 [INFO][4706] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" iface="eth0" netns="" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.747 [INFO][4706] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.748 [INFO][4706] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.786 [INFO][4712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.787 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.787 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.804 [WARNING][4712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.805 [INFO][4712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.808 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.814640 env[1139]: 2024-12-13 14:34:39.811 [INFO][4706] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.815282 env[1139]: time="2024-12-13T14:34:39.815237353Z" level=info msg="TearDown network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" successfully" Dec 13 14:34:39.815369 env[1139]: time="2024-12-13T14:34:39.815349183Z" level=info msg="StopPodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" returns successfully" Dec 13 14:34:39.820678 env[1139]: time="2024-12-13T14:34:39.820623046Z" level=info msg="RemovePodSandbox for \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:34:39.821408 env[1139]: time="2024-12-13T14:34:39.820702064Z" level=info msg="Forcibly stopping sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\"" Dec 13 14:34:39.921472 kernel: audit: type=1101 audit(1734100479.910:1400): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.910000 audit[4611]: USER_ACCT pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.922450 sshd[4611]: Accepted publickey for core from 172.24.4.1 port 35406 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:39.921000 audit[4611]: CRED_ACQ pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.924815 sshd[4611]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:39.929259 kernel: audit: type=1103 audit(1734100479.921:1401): pid=4611 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.935144 kernel: audit: type=1006 audit(1734100479.921:1402): pid=4611 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:34:39.921000 audit[4611]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef2fc0740 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.947145 kernel: audit: type=1300 audit(1734100479.921:1402): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef2fc0740 a2=3 a3=0 items=0 ppid=1 pid=4611 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:39.950078 kernel: audit: type=1327 audit(1734100479.921:1402): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:39.921000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:39.938126 systemd[1]: Started session-16.scope. Dec 13 14:34:39.939957 systemd-logind[1129]: New session 16 of user core. Dec 13 14:34:39.945000 audit[4611]: USER_START pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.957143 kernel: audit: type=1105 audit(1734100479.945:1403): pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.957219 kernel: audit: type=1103 audit(1734100479.949:1404): pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.949000 audit[4744]: CRED_ACQ pid=4744 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.887 [WARNING][4733] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"a23f1496-d17b-4daa-ae28-d51655ac4da7", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"0de110aa0203d5291aa83087ab7d1ac81c6d8107e6615afd454ae82b5e2cf93b", Pod:"coredns-7db6d8ff4d-jkrrc", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8154b1c718a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.887 [INFO][4733] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.887 [INFO][4733] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" iface="eth0" netns="" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.887 [INFO][4733] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.887 [INFO][4733] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.966 [INFO][4740] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.966 [INFO][4740] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.966 [INFO][4740] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.976 [WARNING][4740] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.976 [INFO][4740] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" HandleID="k8s-pod-network.7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--jkrrc-eth0" Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.980 [INFO][4740] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:39.984611 env[1139]: 2024-12-13 14:34:39.982 [INFO][4733] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c" Dec 13 14:34:39.985198 env[1139]: time="2024-12-13T14:34:39.985158983Z" level=info msg="TearDown network for sandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" successfully" Dec 13 14:34:39.989169 env[1139]: time="2024-12-13T14:34:39.989102341Z" level=info msg="RemovePodSandbox \"7ee830b40c90bf9c3a120aa47db2dbc1d4ae794434bf77f96f9a5dbf37716a5c\" returns successfully" Dec 13 14:34:39.992243 env[1139]: time="2024-12-13T14:34:39.992202226Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.039 [WARNING][4761] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6329febd-f041-4c27-bc62-1c4625a32daa", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd", Pod:"coredns-7db6d8ff4d-s8rc4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied5617f61b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.040 [INFO][4761] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.040 [INFO][4761] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" iface="eth0" netns="" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.040 [INFO][4761] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.040 [INFO][4761] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.079 [INFO][4767] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.080 [INFO][4767] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.080 [INFO][4767] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.088 [WARNING][4767] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.088 [INFO][4767] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.089 [INFO][4767] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.096214 env[1139]: 2024-12-13 14:34:40.091 [INFO][4761] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.096214 env[1139]: time="2024-12-13T14:34:40.094487729Z" level=info msg="TearDown network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" successfully" Dec 13 14:34:40.096214 env[1139]: time="2024-12-13T14:34:40.094523296Z" level=info msg="StopPodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" returns successfully" Dec 13 14:34:40.097047 env[1139]: time="2024-12-13T14:34:40.096851343Z" level=info msg="RemovePodSandbox for \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:34:40.097047 env[1139]: time="2024-12-13T14:34:40.096887711Z" level=info msg="Forcibly stopping sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\"" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.143 [WARNING][4786] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"6329febd-f041-4c27-bc62-1c4625a32daa", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"69b84cedf83c09a890ab7deca4221e20547c7c9b196416415d3b136bb3f18afd", Pod:"coredns-7db6d8ff4d-s8rc4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calied5617f61b4", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.144 [INFO][4786] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.144 [INFO][4786] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" iface="eth0" netns="" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.144 [INFO][4786] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.144 [INFO][4786] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.179 [INFO][4792] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.180 [INFO][4792] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.180 [INFO][4792] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.188 [WARNING][4792] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.188 [INFO][4792] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" HandleID="k8s-pod-network.d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-coredns--7db6d8ff4d--s8rc4-eth0" Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.195 [INFO][4792] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.202428 env[1139]: 2024-12-13 14:34:40.200 [INFO][4786] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f" Dec 13 14:34:40.205632 env[1139]: time="2024-12-13T14:34:40.203219726Z" level=info msg="TearDown network for sandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" successfully" Dec 13 14:34:40.206689 env[1139]: time="2024-12-13T14:34:40.206645692Z" level=info msg="RemovePodSandbox \"d11abf896eea5004b8abd5d9f896f414ea93b0b59f366a96828c8fbe3375b84f\" returns successfully" Dec 13 14:34:40.207621 env[1139]: time="2024-12-13T14:34:40.207588190Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.279 [WARNING][4812] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f", Pod:"csi-node-driver-ddccz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5eb3ebe6e06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.280 [INFO][4812] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.280 [INFO][4812] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" iface="eth0" netns="" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.280 [INFO][4812] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.280 [INFO][4812] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.309 [INFO][4821] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.309 [INFO][4821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.309 [INFO][4821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.317 [WARNING][4821] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.317 [INFO][4821] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.321 [INFO][4821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.324978 env[1139]: 2024-12-13 14:34:40.323 [INFO][4812] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.327757 env[1139]: time="2024-12-13T14:34:40.325002002Z" level=info msg="TearDown network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" successfully" Dec 13 14:34:40.327757 env[1139]: time="2024-12-13T14:34:40.325030806Z" level=info msg="StopPodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" returns successfully" Dec 13 14:34:40.327757 env[1139]: time="2024-12-13T14:34:40.325650168Z" level=info msg="RemovePodSandbox for \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:34:40.327757 env[1139]: time="2024-12-13T14:34:40.325693660Z" level=info msg="Forcibly stopping sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\"" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.402 [WARNING][4845] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"52f9b8f3-103b-4e3b-bfc8-f1b392cc9252", ResourceVersion:"981", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"5d044834c808ecef45945250f3bb5caed647b473cb245b4636971b623c8f7f7f", Pod:"csi-node-driver-ddccz", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali5eb3ebe6e06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.403 [INFO][4845] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.403 [INFO][4845] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" iface="eth0" netns="" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.403 [INFO][4845] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.403 [INFO][4845] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.436 [INFO][4851] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.437 [INFO][4851] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.437 [INFO][4851] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.446 [WARNING][4851] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.446 [INFO][4851] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" HandleID="k8s-pod-network.f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-csi--node--driver--ddccz-eth0" Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.449 [INFO][4851] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.453442 env[1139]: 2024-12-13 14:34:40.451 [INFO][4845] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669" Dec 13 14:34:40.453442 env[1139]: time="2024-12-13T14:34:40.453275655Z" level=info msg="TearDown network for sandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" successfully" Dec 13 14:34:40.458556 env[1139]: time="2024-12-13T14:34:40.458142405Z" level=info msg="RemovePodSandbox \"f94daed3a79bb9abf48c15488c1521c881064f9505457150766efa382d7a4669\" returns successfully" Dec 13 14:34:40.458678 env[1139]: time="2024-12-13T14:34:40.458606616Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.550 [WARNING][4869] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0", GenerateName:"calico-kube-controllers-85c677f955-", Namespace:"calico-system", SelfLink:"", UID:"6a632170-9ddc-4121-ae93-2bbdd59415f9", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c677f955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d", Pod:"calico-kube-controllers-85c677f955-rrnxr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5a4fbb0a6d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.550 [INFO][4869] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.551 [INFO][4869] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" iface="eth0" netns="" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.551 [INFO][4869] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.551 [INFO][4869] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.581 [INFO][4876] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.581 [INFO][4876] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.581 [INFO][4876] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.589 [WARNING][4876] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.590 [INFO][4876] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.592 [INFO][4876] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.596909 env[1139]: 2024-12-13 14:34:40.594 [INFO][4869] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.624734 env[1139]: time="2024-12-13T14:34:40.596947684Z" level=info msg="TearDown network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" successfully" Dec 13 14:34:40.624734 env[1139]: time="2024-12-13T14:34:40.596980876Z" level=info msg="StopPodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" returns successfully" Dec 13 14:34:40.624734 env[1139]: time="2024-12-13T14:34:40.597454665Z" level=info msg="RemovePodSandbox for \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:34:40.624734 env[1139]: time="2024-12-13T14:34:40.597515780Z" level=info msg="Forcibly stopping sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\"" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.652 [WARNING][4897] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0", GenerateName:"calico-kube-controllers-85c677f955-", Namespace:"calico-system", SelfLink:"", UID:"6a632170-9ddc-4121-ae93-2bbdd59415f9", ResourceVersion:"950", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 32, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85c677f955", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-6-7-e74dd619d7.novalocal", ContainerID:"a431d900da2e326d18e7f833359a8489771f2329b7814fde8055b0d85e4ace5d", Pod:"calico-kube-controllers-85c677f955-rrnxr", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5a4fbb0a6d4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.652 [INFO][4897] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.652 [INFO][4897] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" iface="eth0" netns="" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.652 [INFO][4897] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.652 [INFO][4897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.675 [INFO][4903] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.675 [INFO][4903] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.675 [INFO][4903] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.683 [WARNING][4903] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.683 [INFO][4903] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" HandleID="k8s-pod-network.3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Workload="ci--3510--3--6--7--e74dd619d7.novalocal-k8s-calico--kube--controllers--85c677f955--rrnxr-eth0" Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.684 [INFO][4903] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:34:40.688650 env[1139]: 2024-12-13 14:34:40.686 [INFO][4897] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5" Dec 13 14:34:40.689490 env[1139]: time="2024-12-13T14:34:40.689457480Z" level=info msg="TearDown network for sandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" successfully" Dec 13 14:34:40.708586 env[1139]: time="2024-12-13T14:34:40.706098216Z" level=info msg="RemovePodSandbox \"3ae9aba303cfd993dd4cca7841dc32ba860d4c9247cb1c2fe4c22edff2402ef5\" returns successfully" Dec 13 14:34:40.783298 sshd[4611]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:40.783000 audit[4611]: USER_END pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:40.786211 systemd[1]: sshd@15-172.24.4.208:22-172.24.4.1:35406.service: Deactivated successfully. Dec 13 14:34:40.786947 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:34:40.788703 systemd-logind[1129]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:34:40.789826 systemd-logind[1129]: Removed session 16. Dec 13 14:34:40.798179 kernel: audit: type=1106 audit(1734100480.783:1405): pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:40.798272 kernel: audit: type=1104 audit(1734100480.783:1406): pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:40.783000 audit[4611]: CRED_DISP pid=4611 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:40.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.208:22-172.24.4.1:35406 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.611591 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.4xF5dJ.mount: Deactivated successfully. Dec 13 14:34:43.377000 audit[3631]: AVC avc: denied { watch } for pid=3631 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.869191454/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c820,c848 tclass=file permissive=0 Dec 13 14:34:43.389320 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:34:43.399691 kernel: audit: type=1400 audit(1734100483.377:1408): avc: denied { watch } for pid=3631 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.869191454/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c820,c848 tclass=file permissive=0 Dec 13 14:34:43.399922 kernel: audit: type=1300 audit(1734100483.377:1408): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00144a940 a2=fc6 a3=0 items=0 ppid=3385 pid=3631 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 key=(null) Dec 13 14:34:43.377000 audit[3631]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00144a940 a2=fc6 a3=0 items=0 ppid=3385 pid=3631 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 key=(null) Dec 13 14:34:43.377000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:43.419398 kernel: audit: type=1327 audit(1734100483.377:1408): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:45.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.208:22-172.24.4.1:47472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:45.793441 systemd[1]: Started sshd@16-172.24.4.208:22-172.24.4.1:47472.service. Dec 13 14:34:45.804258 kernel: audit: type=1130 audit(1734100485.792:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.208:22-172.24.4.1:47472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:46.003000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.016187 kernel: audit: type=1400 audit(1734100486.003:1410): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.003000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026985c0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.033330 kernel: audit: type=1300 audit(1734100486.003:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026985c0 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.003000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.047021 kernel: audit: type=1327 audit(1734100486.003:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.047303 kernel: audit: type=1400 audit(1734100486.007:1411): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.007000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.007000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698620 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.007000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.083474 kernel: audit: type=1300 audit(1734100486.007:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698620 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.084889 kernel: audit: type=1327 audit(1734100486.007:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.008000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.008000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698640 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.008000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:34:46.008000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002698660 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:34:46.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:34:46.611001 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.QgYpaW.mount: Deactivated successfully. Dec 13 14:34:46.897000 audit[4935]: USER_ACCT pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:46.899467 sshd[4935]: Accepted publickey for core from 172.24.4.1 port 47472 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:46.901000 audit[4935]: CRED_ACQ pid=4935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:46.901000 audit[4935]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc6b53640 a2=3 a3=0 items=0 ppid=1 pid=4935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:46.901000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:46.903321 sshd[4935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:46.916279 systemd-logind[1129]: New session 17 of user core. Dec 13 14:34:46.920103 systemd[1]: Started session-17.scope. Dec 13 14:34:46.935000 audit[4935]: USER_START pid=4935 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:46.939000 audit[4959]: CRED_ACQ pid=4959 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:47.687816 sshd[4935]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:47.689000 audit[4935]: USER_END pid=4935 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:47.690000 audit[4935]: CRED_DISP pid=4935 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:47.694262 systemd[1]: sshd@16-172.24.4.208:22-172.24.4.1:47472.service: Deactivated successfully. Dec 13 14:34:47.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.208:22-172.24.4.1:47472 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:47.695971 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:34:47.697947 systemd-logind[1129]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:34:47.700328 systemd-logind[1129]: Removed session 17. Dec 13 14:34:49.916742 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.6u83iR.mount: Deactivated successfully. Dec 13 14:34:51.876157 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 14:34:51.876266 kernel: audit: type=1400 audit(1734100491.871:1422): avc: denied { watch } for pid=4170 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.1138924832/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c488,c812 tclass=file permissive=0 Dec 13 14:34:51.871000 audit[4170]: AVC avc: denied { watch } for pid=4170 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.1138924832/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c488,c812 tclass=file permissive=0 Dec 13 14:34:51.871000 audit[4170]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0024ef400 a2=fc6 a3=0 items=0 ppid=4100 pid=4170 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 key=(null) Dec 13 14:34:51.904201 kernel: audit: type=1300 audit(1734100491.871:1422): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0024ef400 a2=fc6 a3=0 items=0 ppid=4100 pid=4170 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 key=(null) Dec 13 14:34:51.871000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:51.918176 kernel: audit: type=1327 audit(1734100491.871:1422): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:34:52.696886 systemd[1]: Started sshd@17-172.24.4.208:22-172.24.4.1:47480.service. Dec 13 14:34:52.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.208:22-172.24.4.1:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:52.708193 kernel: audit: type=1130 audit(1734100492.696:1423): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.208:22-172.24.4.1:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.038000 audit[4990]: USER_ACCT pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.042078 sshd[4990]: Accepted publickey for core from 172.24.4.1 port 47480 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:34:54.051186 kernel: audit: type=1101 audit(1734100494.038:1424): pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.053000 audit[4990]: CRED_ACQ pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.055339 sshd[4990]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:34:54.204100 kernel: audit: type=1103 audit(1734100494.053:1425): pid=4990 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.204346 kernel: audit: type=1006 audit(1734100494.053:1426): pid=4990 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:34:54.204464 kernel: audit: type=1300 audit(1734100494.053:1426): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26e20090 a2=3 a3=0 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.204870 kernel: audit: type=1327 audit(1734100494.053:1426): proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:54.205000 kernel: audit: type=1105 audit(1734100494.111:1427): pid=4990 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.053000 audit[4990]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe26e20090 a2=3 a3=0 items=0 ppid=1 pid=4990 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:54.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:34:54.111000 audit[4990]: USER_START pid=4990 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.125000 audit[4992]: CRED_ACQ pid=4992 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.095307 systemd-logind[1129]: New session 18 of user core. Dec 13 14:34:54.097432 systemd[1]: Started session-18.scope. Dec 13 14:34:54.975208 sshd[4990]: pam_unix(sshd:session): session closed for user core Dec 13 14:34:54.976000 audit[4990]: USER_END pid=4990 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.977000 audit[4990]: CRED_DISP pid=4990 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:34:54.988290 systemd[1]: sshd@17-172.24.4.208:22-172.24.4.1:47480.service: Deactivated successfully. Dec 13 14:34:54.987000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.208:22-172.24.4.1:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:54.989719 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:34:54.991396 systemd-logind[1129]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:34:54.993322 systemd-logind[1129]: Removed session 18. Dec 13 14:34:59.982904 systemd[1]: Started sshd@18-172.24.4.208:22-172.24.4.1:40058.service. Dec 13 14:34:59.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.208:22-172.24.4.1:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:59.986641 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:34:59.986755 kernel: audit: type=1130 audit(1734100499.982:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.208:22-172.24.4.1:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:01.291639 sshd[5007]: Accepted publickey for core from 172.24.4.1 port 40058 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:01.290000 audit[5007]: USER_ACCT pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.297143 kernel: audit: type=1101 audit(1734100501.290:1433): pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.297729 sshd[5007]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:01.296000 audit[5007]: CRED_ACQ pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.304178 kernel: audit: type=1103 audit(1734100501.296:1434): pid=5007 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.309143 kernel: audit: type=1006 audit(1734100501.296:1435): pid=5007 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:35:01.309409 systemd-logind[1129]: New session 19 of user core. Dec 13 14:35:01.296000 audit[5007]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfec1cc20 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:01.315135 kernel: audit: type=1300 audit(1734100501.296:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfec1cc20 a2=3 a3=0 items=0 ppid=1 pid=5007 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:01.296000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:01.317602 systemd[1]: Started session-19.scope. Dec 13 14:35:01.320141 kernel: audit: type=1327 audit(1734100501.296:1435): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:01.322000 audit[5007]: USER_START pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.330136 kernel: audit: type=1105 audit(1734100501.322:1436): pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.329000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:01.335133 kernel: audit: type=1103 audit(1734100501.329:1437): pid=5009 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:02.047475 sshd[5007]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:02.055685 systemd[1]: Started sshd@19-172.24.4.208:22-172.24.4.1:40070.service. Dec 13 14:35:02.054000 audit[5007]: USER_END pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:02.058442 systemd[1]: sshd@18-172.24.4.208:22-172.24.4.1:40058.service: Deactivated successfully. Dec 13 14:35:02.063587 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:35:02.068077 kernel: audit: type=1106 audit(1734100502.054:1438): pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:02.068187 kernel: audit: type=1104 audit(1734100502.054:1439): pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:02.054000 audit[5007]: CRED_DISP pid=5007 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:02.064729 systemd-logind[1129]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:35:02.065854 systemd-logind[1129]: Removed session 19. Dec 13 14:35:02.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.208:22-172.24.4.1:40070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:02.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.208:22-172.24.4.1:40058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:03.352000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:03.353628 sshd[5017]: Accepted publickey for core from 172.24.4.1 port 40070 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:03.353000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:03.353000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffce13022e0 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:03.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:03.354899 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:03.360106 systemd[1]: Started session-20.scope. Dec 13 14:35:03.361171 systemd-logind[1129]: New session 20 of user core. Dec 13 14:35:03.365000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:03.367000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:04.735370 sshd[5017]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:04.742000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:04.743575 systemd[1]: Started sshd@20-172.24.4.208:22-172.24.4.1:36800.service. Dec 13 14:35:04.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.208:22-172.24.4.1:36800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:04.744000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:04.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.208:22-172.24.4.1:40070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:04.750377 systemd[1]: sshd@19-172.24.4.208:22-172.24.4.1:40070.service: Deactivated successfully. Dec 13 14:35:04.752690 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:35:04.755614 systemd-logind[1129]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:35:04.760712 systemd-logind[1129]: Removed session 20. Dec 13 14:35:06.179642 sshd[5027]: Accepted publickey for core from 172.24.4.1 port 36800 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:06.185397 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:35:06.185593 kernel: audit: type=1101 audit(1734100506.178:1451): pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.178000 audit[5027]: USER_ACCT pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.184942 sshd[5027]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:06.182000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.209433 kernel: audit: type=1103 audit(1734100506.182:1452): pid=5027 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.217698 kernel: audit: type=1006 audit(1734100506.182:1453): pid=5027 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 14:35:06.218221 kernel: audit: type=1300 audit(1734100506.182:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5dc916e0 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.182000 audit[5027]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd5dc916e0 a2=3 a3=0 items=0 ppid=1 pid=5027 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:06.182000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:06.234661 kernel: audit: type=1327 audit(1734100506.182:1453): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:06.241945 systemd-logind[1129]: New session 21 of user core. Dec 13 14:35:06.244432 systemd[1]: Started session-21.scope. Dec 13 14:35:06.253000 audit[5027]: USER_START pid=5027 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.261511 kernel: audit: type=1105 audit(1734100506.253:1454): pid=5027 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.261654 kernel: audit: type=1103 audit(1734100506.259:1455): pid=5030 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:06.259000 audit[5030]: CRED_ACQ pid=5030 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:09.648000 audit[5045]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.648000 audit[5045]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcdbf6fc40 a2=0 a3=7ffcdbf6fc2c items=0 ppid=2206 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.676889 kernel: audit: type=1325 audit(1734100509.648:1456): table=filter:118 family=2 entries=20 op=nft_register_rule pid=5045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.677191 kernel: audit: type=1300 audit(1734100509.648:1456): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcdbf6fc40 a2=0 a3=7ffcdbf6fc2c items=0 ppid=2206 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.688157 kernel: audit: type=1327 audit(1734100509.648:1456): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.690000 audit[5045]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5045 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.690000 audit[5045]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffcdbf6fc40 a2=0 a3=0 items=0 ppid=2206 pid=5045 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.713000 audit[5049]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.713000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd86c10c30 a2=0 a3=7ffd86c10c1c items=0 ppid=2206 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.713000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.719000 audit[5049]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:09.719000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd86c10c30 a2=0 a3=0 items=0 ppid=2206 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:09.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:09.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.208:22-172.24.4.1:36808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:09.870157 systemd[1]: Started sshd@21-172.24.4.208:22-172.24.4.1:36808.service. Dec 13 14:35:09.920976 sshd[5027]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:09.945000 audit[5027]: USER_END pid=5027 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:09.950000 audit[5027]: CRED_DISP pid=5027 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:10.022312 systemd[1]: sshd@20-172.24.4.208:22-172.24.4.1:36800.service: Deactivated successfully. Dec 13 14:35:10.021000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.208:22-172.24.4.1:36800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:10.024608 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:35:10.026709 systemd-logind[1129]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:35:10.030089 systemd-logind[1129]: Removed session 21. Dec 13 14:35:11.215000 audit[5051]: USER_ACCT pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.217235 sshd[5051]: Accepted publickey for core from 172.24.4.1 port 36808 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:11.220836 kernel: kauditd_printk_skb: 13 callbacks suppressed Dec 13 14:35:11.220977 kernel: audit: type=1101 audit(1734100511.215:1464): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.230000 audit[5051]: CRED_ACQ pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.235425 sshd[5051]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:11.243090 kernel: audit: type=1103 audit(1734100511.230:1465): pid=5051 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.244499 kernel: audit: type=1006 audit(1734100511.230:1466): pid=5051 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:35:11.230000 audit[5051]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34a48da0 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:11.264159 kernel: audit: type=1300 audit(1734100511.230:1466): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd34a48da0 a2=3 a3=0 items=0 ppid=1 pid=5051 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:11.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:11.270225 kernel: audit: type=1327 audit(1734100511.230:1466): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:11.278671 systemd[1]: Started session-22.scope. Dec 13 14:35:11.280306 systemd-logind[1129]: New session 22 of user core. Dec 13 14:35:11.293000 audit[5051]: USER_START pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.307234 kernel: audit: type=1105 audit(1734100511.293:1467): pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.294000 audit[5054]: CRED_ACQ pid=5054 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:11.322159 kernel: audit: type=1103 audit(1734100511.294:1468): pid=5054 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:13.935169 sshd[5051]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:13.935000 audit[5051]: USER_END pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:13.939764 systemd[1]: sshd@21-172.24.4.208:22-172.24.4.1:36808.service: Deactivated successfully. Dec 13 14:35:13.940395 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:35:13.943323 systemd[1]: Started sshd@22-172.24.4.208:22-172.24.4.1:36814.service. Dec 13 14:35:13.944994 systemd-logind[1129]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:35:13.946694 systemd-logind[1129]: Removed session 22. Dec 13 14:35:13.935000 audit[5051]: CRED_DISP pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:13.960259 kernel: audit: type=1106 audit(1734100513.935:1469): pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:13.961694 kernel: audit: type=1104 audit(1734100513.935:1470): pid=5051 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:13.961732 kernel: audit: type=1131 audit(1734100513.938:1471): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.208:22-172.24.4.1:36808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.208:22-172.24.4.1:36808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:13.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.208:22-172.24.4.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:15.641025 sshd[5062]: Accepted publickey for core from 172.24.4.1 port 36814 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:15.639000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:15.641000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:15.642000 audit[5062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0941dd00 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:15.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:15.644668 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:15.655967 systemd[1]: Started session-23.scope. Dec 13 14:35:15.656901 systemd-logind[1129]: New session 23 of user core. Dec 13 14:35:15.669000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:15.672000 audit[5064]: CRED_ACQ pid=5064 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:16.631534 systemd[1]: run-containerd-runc-k8s.io-adc0787459798538adb27e0ffaac95225a443c90efc713d766905fa9a9767382-runc.bDl2tu.mount: Deactivated successfully. Dec 13 14:35:16.705530 sshd[5062]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:16.709513 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 14:35:16.709660 kernel: audit: type=1106 audit(1734100516.706:1478): pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:16.706000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:16.715257 systemd[1]: sshd@22-172.24.4.208:22-172.24.4.1:36814.service: Deactivated successfully. Dec 13 14:35:16.783909 kernel: audit: type=1104 audit(1734100516.706:1479): pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:16.784040 kernel: audit: type=1131 audit(1734100516.714:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.208:22-172.24.4.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:16.706000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:16.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.208:22-172.24.4.1:36814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:16.715994 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:35:16.721250 systemd-logind[1129]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:35:16.728025 systemd-logind[1129]: Removed session 23. Dec 13 14:35:19.698000 audit[5106]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.698000 audit[5106]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe6283cb70 a2=0 a3=7ffe6283cb5c items=0 ppid=2206 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.709322 kernel: audit: type=1325 audit(1734100519.698:1481): table=filter:122 family=2 entries=20 op=nft_register_rule pid=5106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.709412 kernel: audit: type=1300 audit(1734100519.698:1481): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe6283cb70 a2=0 a3=7ffe6283cb5c items=0 ppid=2206 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.698000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.714135 kernel: audit: type=1327 audit(1734100519.698:1481): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.716000 audit[5106]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.722139 kernel: audit: type=1325 audit(1734100519.716:1482): table=nat:123 family=2 entries=106 op=nft_register_chain pid=5106 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:35:19.722199 kernel: audit: type=1300 audit(1734100519.716:1482): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe6283cb70 a2=0 a3=7ffe6283cb5c items=0 ppid=2206 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.716000 audit[5106]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffe6283cb70 a2=0 a3=7ffe6283cb5c items=0 ppid=2206 pid=5106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:19.716000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.730476 kernel: audit: type=1327 audit(1734100519.716:1482): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:35:19.916243 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.ecEARL.mount: Deactivated successfully. Dec 13 14:35:21.723607 systemd[1]: Started sshd@23-172.24.4.208:22-172.24.4.1:47536.service. Dec 13 14:35:21.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.208:22-172.24.4.1:47536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:21.737202 kernel: audit: type=1130 audit(1734100521.725:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.208:22-172.24.4.1:47536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:23.277000 audit[5129]: USER_ACCT pid=5129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.279166 sshd[5129]: Accepted publickey for core from 172.24.4.1 port 47536 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:23.283219 kernel: audit: type=1101 audit(1734100523.277:1484): pid=5129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.282000 audit[5129]: CRED_ACQ pid=5129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.289174 kernel: audit: type=1103 audit(1734100523.282:1485): pid=5129 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.295206 kernel: audit: type=1006 audit(1734100523.282:1486): pid=5129 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:35:23.282000 audit[5129]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1dd1c330 a2=3 a3=0 items=0 ppid=1 pid=5129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:23.307622 sshd[5129]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:23.308167 kernel: audit: type=1300 audit(1734100523.282:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1dd1c330 a2=3 a3=0 items=0 ppid=1 pid=5129 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:23.282000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:23.316153 kernel: audit: type=1327 audit(1734100523.282:1486): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:23.322056 systemd[1]: Started session-24.scope. Dec 13 14:35:23.323239 systemd-logind[1129]: New session 24 of user core. Dec 13 14:35:23.340240 kernel: audit: type=1105 audit(1734100523.332:1487): pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.332000 audit[5129]: USER_START pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.339000 audit[5131]: CRED_ACQ pid=5131 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:23.345161 kernel: audit: type=1103 audit(1734100523.339:1488): pid=5131 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:24.025498 sshd[5129]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:24.027000 audit[5129]: USER_END pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:24.031169 systemd[1]: sshd@23-172.24.4.208:22-172.24.4.1:47536.service: Deactivated successfully. Dec 13 14:35:24.032486 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:35:24.044149 kernel: audit: type=1106 audit(1734100524.027:1489): pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:24.027000 audit[5129]: CRED_DISP pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:24.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.208:22-172.24.4.1:47536 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:24.050833 systemd-logind[1129]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:35:24.051172 kernel: audit: type=1104 audit(1734100524.027:1490): pid=5129 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:24.052688 systemd-logind[1129]: Removed session 24. Dec 13 14:35:28.163000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:28.168480 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:28.169239 kernel: audit: type=1400 audit(1734100528.163:1492): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:28.164000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:28.188931 kernel: audit: type=1400 audit(1734100528.164:1493): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:28.189398 kernel: audit: type=1300 audit(1734100528.164:1493): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b8a810 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:28.164000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002b8a810 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:28.164000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:28.213982 kernel: audit: type=1327 audit(1734100528.164:1493): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:28.214179 kernel: audit: type=1300 audit(1734100528.163:1492): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a8df00 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:28.163000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a8df00 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:28.163000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:28.238815 kernel: audit: type=1327 audit(1734100528.163:1492): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:29.036987 systemd[1]: Started sshd@24-172.24.4.208:22-172.24.4.1:33966.service. Dec 13 14:35:29.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.208:22-172.24.4.1:33966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:29.048315 kernel: audit: type=1130 audit(1734100529.036:1494): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.208:22-172.24.4.1:33966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:29.229000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.245368 kernel: audit: type=1400 audit(1734100529.229:1495): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.229000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.229000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008bb3530 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.277208 kernel: audit: type=1400 audit(1734100529.229:1496): avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526916 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.277459 kernel: audit: type=1300 audit(1734100529.229:1496): arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008bb3530 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:29.230000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526910 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.230000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c008bb3560 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.230000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:29.229000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0099f5260 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.229000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:29.231000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.231000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0069d9cc0 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.231000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:29.234000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.234000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c001239c80 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.234000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:29.235000 audit[1918]: AVC avc: denied { watch } for pid=1918 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526914 scontext=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:29.235000 audit[1918]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c0099f5410 a2=fc6 a3=0 items=0 ppid=1752 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c284,c449 key=(null) Dec 13 14:35:29.235000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323038002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:35:30.061000 audit[5140]: USER_ACCT pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.063492 sshd[5140]: Accepted publickey for core from 172.24.4.1 port 33966 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:30.063000 audit[5140]: CRED_ACQ pid=5140 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.063000 audit[5140]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc948be120 a2=3 a3=0 items=0 ppid=1 pid=5140 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:30.063000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:30.065891 sshd[5140]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:30.077170 systemd-logind[1129]: New session 25 of user core. Dec 13 14:35:30.079707 systemd[1]: Started session-25.scope. Dec 13 14:35:30.093000 audit[5140]: USER_START pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.096000 audit[5142]: CRED_ACQ pid=5142 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.723750 sshd[5140]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:30.725000 audit[5140]: USER_END pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.726000 audit[5140]: CRED_DISP pid=5140 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:30.732349 systemd[1]: sshd@24-172.24.4.208:22-172.24.4.1:33966.service: Deactivated successfully. Dec 13 14:35:30.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.208:22-172.24.4.1:33966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:30.734046 systemd-logind[1129]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:35:30.734293 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:35:30.738070 systemd-logind[1129]: Removed session 25. Dec 13 14:35:35.735225 systemd[1]: Started sshd@25-172.24.4.208:22-172.24.4.1:56608.service. Dec 13 14:35:35.742419 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:35:35.742655 kernel: audit: type=1130 audit(1734100535.734:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.208:22-172.24.4.1:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:35.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.208:22-172.24.4.1:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:37.141000 audit[5152]: USER_ACCT pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.144490 sshd[5152]: Accepted publickey for core from 172.24.4.1 port 56608 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:37.164188 kernel: audit: type=1101 audit(1734100537.141:1510): pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.165295 kernel: audit: type=1103 audit(1734100537.163:1511): pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.163000 audit[5152]: CRED_ACQ pid=5152 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.166571 sshd[5152]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:37.182428 kernel: audit: type=1006 audit(1734100537.163:1512): pid=5152 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:35:37.163000 audit[5152]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad93b190 a2=3 a3=0 items=0 ppid=1 pid=5152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:37.185640 systemd[1]: Started session-26.scope. Dec 13 14:35:37.193564 kernel: audit: type=1300 audit(1734100537.163:1512): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcad93b190 a2=3 a3=0 items=0 ppid=1 pid=5152 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:37.194369 systemd-logind[1129]: New session 26 of user core. Dec 13 14:35:37.163000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:37.201181 kernel: audit: type=1327 audit(1734100537.163:1512): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:37.211000 audit[5152]: USER_START pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.225250 kernel: audit: type=1105 audit(1734100537.211:1513): pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.224000 audit[5157]: CRED_ACQ pid=5157 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.230233 kernel: audit: type=1103 audit(1734100537.224:1514): pid=5157 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.948628 sshd[5152]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:37.949000 audit[5152]: USER_END pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.964171 kernel: audit: type=1106 audit(1734100537.949:1515): pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.950000 audit[5152]: CRED_DISP pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.964699 systemd[1]: sshd@25-172.24.4.208:22-172.24.4.1:56608.service: Deactivated successfully. Dec 13 14:35:37.966268 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:35:37.976179 kernel: audit: type=1104 audit(1734100537.950:1516): pid=5152 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:37.977899 systemd-logind[1129]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:35:37.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.208:22-172.24.4.1:56608 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:37.981544 systemd-logind[1129]: Removed session 26. Dec 13 14:35:42.961835 systemd[1]: Started sshd@26-172.24.4.208:22-172.24.4.1:56614.service. Dec 13 14:35:42.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.208:22-172.24.4.1:56614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:42.966295 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:35:42.966461 kernel: audit: type=1130 audit(1734100542.961:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.208:22-172.24.4.1:56614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:43.445000 audit[3631]: AVC avc: denied { watch } for pid=3631 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.869191454/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c820,c848 tclass=file permissive=0 Dec 13 14:35:43.445000 audit[3631]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00144a260 a2=fc6 a3=0 items=0 ppid=3385 pid=3631 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 key=(null) Dec 13 14:35:43.471173 kernel: audit: type=1400 audit(1734100543.445:1519): avc: denied { watch } for pid=3631 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.869191454/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c820,c848 tclass=file permissive=0 Dec 13 14:35:43.471355 kernel: audit: type=1300 audit(1734100543.445:1519): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00144a260 a2=fc6 a3=0 items=0 ppid=3385 pid=3631 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c820,c848 key=(null) Dec 13 14:35:43.445000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:43.482690 kernel: audit: type=1327 audit(1734100543.445:1519): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:44.354445 sshd[5186]: Accepted publickey for core from 172.24.4.1 port 56614 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:44.354000 audit[5186]: USER_ACCT pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.365189 kernel: audit: type=1101 audit(1734100544.354:1520): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.368989 sshd[5186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:44.365000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.388185 kernel: audit: type=1103 audit(1734100544.365:1521): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.400017 kernel: audit: type=1006 audit(1734100544.365:1522): pid=5186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:35:44.400222 kernel: audit: type=1300 audit(1734100544.365:1522): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8b985920 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.365000 audit[5186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8b985920 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:44.399254 systemd-logind[1129]: New session 27 of user core. Dec 13 14:35:44.365000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:44.413896 systemd[1]: Started session-27.scope. Dec 13 14:35:44.414603 kernel: audit: type=1327 audit(1734100544.365:1522): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:44.428000 audit[5186]: USER_START pid=5186 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.441201 kernel: audit: type=1105 audit(1734100544.428:1523): pid=5186 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:44.435000 audit[5188]: CRED_ACQ pid=5188 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:45.499751 sshd[5186]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:45.503000 audit[5186]: USER_END pid=5186 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:45.503000 audit[5186]: CRED_DISP pid=5186 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:45.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.208:22-172.24.4.1:56614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:45.506585 systemd[1]: sshd@26-172.24.4.208:22-172.24.4.1:56614.service: Deactivated successfully. Dec 13 14:35:45.509019 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:35:45.513010 systemd-logind[1129]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:35:45.515889 systemd-logind[1129]: Removed session 27. Dec 13 14:35:46.008000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.008000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b2b120 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:46.008000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.009000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.009000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b2b140 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:46.009000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.010000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.010000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b2b160 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:46.010000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:46.010000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526908 scontext=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:35:46.010000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001b2b180 a2=fc6 a3=0 items=0 ppid=1728 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c540,c592 key=(null) Dec 13 14:35:46.010000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:35:49.958279 systemd[1]: run-containerd-runc-k8s.io-bef7179c889b3b59627e4289e7a8f7849efa7b05648a25f05b04bc8dae9a109e-runc.ZO44LV.mount: Deactivated successfully. Dec 13 14:35:50.511049 systemd[1]: Started sshd@27-172.24.4.208:22-172.24.4.1:47364.service. Dec 13 14:35:50.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.208:22-172.24.4.1:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:50.515403 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 14:35:50.515534 kernel: audit: type=1130 audit(1734100550.512:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.208:22-172.24.4.1:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:51.798000 audit[5240]: USER_ACCT pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.799675 sshd[5240]: Accepted publickey for core from 172.24.4.1 port 47364 ssh2: RSA SHA256:2ngTm68CMx36X1xnKPqUJq9w0RJJht3bhOuOq01A7tI Dec 13 14:35:51.808185 kernel: audit: type=1101 audit(1734100551.798:1533): pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.813360 kernel: audit: type=1103 audit(1734100551.807:1534): pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.813558 kernel: audit: type=1006 audit(1734100551.808:1535): pid=5240 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:35:51.807000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.808980 sshd[5240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:51.808000 audit[5240]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7b981cc0 a2=3 a3=0 items=0 ppid=1 pid=5240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.821521 kernel: audit: type=1300 audit(1734100551.808:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7b981cc0 a2=3 a3=0 items=0 ppid=1 pid=5240 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:35:51.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:51.824162 kernel: audit: type=1327 audit(1734100551.808:1535): proctitle=737368643A20636F7265205B707269765D Dec 13 14:35:51.829213 systemd-logind[1129]: New session 28 of user core. Dec 13 14:35:51.829473 systemd[1]: Started session-28.scope. Dec 13 14:35:51.837000 audit[5240]: USER_START pid=5240 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.843343 kernel: audit: type=1105 audit(1734100551.837:1536): pid=5240 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.840000 audit[5244]: CRED_ACQ pid=5244 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.850281 kernel: audit: type=1103 audit(1734100551.840:1537): pid=5244 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:51.876000 audit[4170]: AVC avc: denied { watch } for pid=4170 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.1138924832/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c488,c812 tclass=file permissive=0 Dec 13 14:35:51.882215 kernel: audit: type=1400 audit(1734100551.876:1538): avc: denied { watch } for pid=4170 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_33_19.1138924832/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c488,c812 tclass=file permissive=0 Dec 13 14:35:51.882397 kernel: audit: type=1300 audit(1734100551.876:1538): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020e09a0 a2=fc6 a3=0 items=0 ppid=4100 pid=4170 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 key=(null) Dec 13 14:35:51.876000 audit[4170]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0020e09a0 a2=fc6 a3=0 items=0 ppid=4100 pid=4170 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c488,c812 key=(null) Dec 13 14:35:51.876000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:35:52.567419 sshd[5240]: pam_unix(sshd:session): session closed for user core Dec 13 14:35:52.569000 audit[5240]: USER_END pid=5240 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:52.569000 audit[5240]: CRED_DISP pid=5240 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' Dec 13 14:35:52.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.208:22-172.24.4.1:47364 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:35:52.571415 systemd[1]: sshd@27-172.24.4.208:22-172.24.4.1:47364.service: Deactivated successfully. Dec 13 14:35:52.572264 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:35:52.574308 systemd-logind[1129]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:35:52.576586 systemd-logind[1129]: Removed session 28.