Dec 13 14:34:32.647263 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Dec 13 12:55:10 -00 2024 Dec 13 14:34:32.647278 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:32.647285 kernel: Disabled fast string operations Dec 13 14:34:32.647288 kernel: BIOS-provided physical RAM map: Dec 13 14:34:32.647292 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ebff] usable Dec 13 14:34:32.647296 kernel: BIOS-e820: [mem 0x000000000009ec00-0x000000000009ffff] reserved Dec 13 14:34:32.647301 kernel: BIOS-e820: [mem 0x00000000000dc000-0x00000000000fffff] reserved Dec 13 14:34:32.647305 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007fedffff] usable Dec 13 14:34:32.647309 kernel: BIOS-e820: [mem 0x000000007fee0000-0x000000007fefefff] ACPI data Dec 13 14:34:32.647313 kernel: BIOS-e820: [mem 0x000000007feff000-0x000000007fefffff] ACPI NVS Dec 13 14:34:32.647317 kernel: BIOS-e820: [mem 0x000000007ff00000-0x000000007fffffff] usable Dec 13 14:34:32.647321 kernel: BIOS-e820: [mem 0x00000000f0000000-0x00000000f7ffffff] reserved Dec 13 14:34:32.647324 kernel: BIOS-e820: [mem 0x00000000fec00000-0x00000000fec0ffff] reserved Dec 13 14:34:32.647328 kernel: BIOS-e820: [mem 0x00000000fee00000-0x00000000fee00fff] reserved Dec 13 14:34:32.647334 kernel: BIOS-e820: [mem 0x00000000fffe0000-0x00000000ffffffff] reserved Dec 13 14:34:32.647338 kernel: NX (Execute Disable) protection: active Dec 13 14:34:32.647342 kernel: SMBIOS 2.7 present. Dec 13 14:34:32.647347 kernel: DMI: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 05/28/2020 Dec 13 14:34:32.647351 kernel: vmware: hypercall mode: 0x00 Dec 13 14:34:32.647357 kernel: Hypervisor detected: VMware Dec 13 14:34:32.647365 kernel: vmware: TSC freq read from hypervisor : 3408.000 MHz Dec 13 14:34:32.647372 kernel: vmware: Host bus clock speed read from hypervisor : 66000000 Hz Dec 13 14:34:32.647378 kernel: vmware: using clock offset of 3124679475 ns Dec 13 14:34:32.647385 kernel: tsc: Detected 3408.000 MHz processor Dec 13 14:34:32.647390 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 14:34:32.647395 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 14:34:32.647399 kernel: last_pfn = 0x80000 max_arch_pfn = 0x400000000 Dec 13 14:34:32.647403 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 14:34:32.647407 kernel: total RAM covered: 3072M Dec 13 14:34:32.647413 kernel: Found optimal setting for mtrr clean up Dec 13 14:34:32.647418 kernel: gran_size: 64K chunk_size: 64K num_reg: 2 lose cover RAM: 0G Dec 13 14:34:32.647422 kernel: Using GB pages for direct mapping Dec 13 14:34:32.647426 kernel: ACPI: Early table checksum verification disabled Dec 13 14:34:32.647431 kernel: ACPI: RSDP 0x00000000000F6A00 000024 (v02 PTLTD ) Dec 13 14:34:32.647435 kernel: ACPI: XSDT 0x000000007FEE965B 00005C (v01 INTEL 440BX 06040000 VMW 01324272) Dec 13 14:34:32.647440 kernel: ACPI: FACP 0x000000007FEFEE73 0000F4 (v04 INTEL 440BX 06040000 PTL 000F4240) Dec 13 14:34:32.647444 kernel: ACPI: DSDT 0x000000007FEEAD55 01411E (v01 PTLTD Custom 06040000 MSFT 03000001) Dec 13 14:34:32.647448 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:34:32.647452 kernel: ACPI: FACS 0x000000007FEFFFC0 000040 Dec 13 14:34:32.647458 kernel: ACPI: BOOT 0x000000007FEEAD2D 000028 (v01 PTLTD $SBFTBL$ 06040000 LTP 00000001) Dec 13 14:34:32.647464 kernel: ACPI: APIC 0x000000007FEEA5EB 000742 (v01 PTLTD ? APIC 06040000 LTP 00000000) Dec 13 14:34:32.647469 kernel: ACPI: MCFG 0x000000007FEEA5AF 00003C (v01 PTLTD $PCITBL$ 06040000 LTP 00000001) Dec 13 14:34:32.647473 kernel: ACPI: SRAT 0x000000007FEE9757 0008A8 (v02 VMWARE MEMPLUG 06040000 VMW 00000001) Dec 13 14:34:32.647478 kernel: ACPI: HPET 0x000000007FEE971F 000038 (v01 VMWARE VMW HPET 06040000 VMW 00000001) Dec 13 14:34:32.647484 kernel: ACPI: WAET 0x000000007FEE96F7 000028 (v01 VMWARE VMW WAET 06040000 VMW 00000001) Dec 13 14:34:32.647488 kernel: ACPI: Reserving FACP table memory at [mem 0x7fefee73-0x7fefef66] Dec 13 14:34:32.647493 kernel: ACPI: Reserving DSDT table memory at [mem 0x7feead55-0x7fefee72] Dec 13 14:34:32.647498 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:34:32.647502 kernel: ACPI: Reserving FACS table memory at [mem 0x7fefffc0-0x7fefffff] Dec 13 14:34:32.647507 kernel: ACPI: Reserving BOOT table memory at [mem 0x7feead2d-0x7feead54] Dec 13 14:34:32.647512 kernel: ACPI: Reserving APIC table memory at [mem 0x7feea5eb-0x7feead2c] Dec 13 14:34:32.647516 kernel: ACPI: Reserving MCFG table memory at [mem 0x7feea5af-0x7feea5ea] Dec 13 14:34:32.647521 kernel: ACPI: Reserving SRAT table memory at [mem 0x7fee9757-0x7fee9ffe] Dec 13 14:34:32.647526 kernel: ACPI: Reserving HPET table memory at [mem 0x7fee971f-0x7fee9756] Dec 13 14:34:32.647531 kernel: ACPI: Reserving WAET table memory at [mem 0x7fee96f7-0x7fee971e] Dec 13 14:34:32.647535 kernel: system APIC only can use physical flat Dec 13 14:34:32.647540 kernel: Setting APIC routing to physical flat. Dec 13 14:34:32.647544 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 14:34:32.647549 kernel: SRAT: PXM 0 -> APIC 0x02 -> Node 0 Dec 13 14:34:32.647554 kernel: SRAT: PXM 0 -> APIC 0x04 -> Node 0 Dec 13 14:34:32.649414 kernel: SRAT: PXM 0 -> APIC 0x06 -> Node 0 Dec 13 14:34:32.649422 kernel: SRAT: PXM 0 -> APIC 0x08 -> Node 0 Dec 13 14:34:32.649445 kernel: SRAT: PXM 0 -> APIC 0x0a -> Node 0 Dec 13 14:34:32.649450 kernel: SRAT: PXM 0 -> APIC 0x0c -> Node 0 Dec 13 14:34:32.649455 kernel: SRAT: PXM 0 -> APIC 0x0e -> Node 0 Dec 13 14:34:32.649460 kernel: SRAT: PXM 0 -> APIC 0x10 -> Node 0 Dec 13 14:34:32.649465 kernel: SRAT: PXM 0 -> APIC 0x12 -> Node 0 Dec 13 14:34:32.649469 kernel: SRAT: PXM 0 -> APIC 0x14 -> Node 0 Dec 13 14:34:32.649474 kernel: SRAT: PXM 0 -> APIC 0x16 -> Node 0 Dec 13 14:34:32.649479 kernel: SRAT: PXM 0 -> APIC 0x18 -> Node 0 Dec 13 14:34:32.649484 kernel: SRAT: PXM 0 -> APIC 0x1a -> Node 0 Dec 13 14:34:32.649488 kernel: SRAT: PXM 0 -> APIC 0x1c -> Node 0 Dec 13 14:34:32.649494 kernel: SRAT: PXM 0 -> APIC 0x1e -> Node 0 Dec 13 14:34:32.649499 kernel: SRAT: PXM 0 -> APIC 0x20 -> Node 0 Dec 13 14:34:32.649504 kernel: SRAT: PXM 0 -> APIC 0x22 -> Node 0 Dec 13 14:34:32.649508 kernel: SRAT: PXM 0 -> APIC 0x24 -> Node 0 Dec 13 14:34:32.649513 kernel: SRAT: PXM 0 -> APIC 0x26 -> Node 0 Dec 13 14:34:32.649518 kernel: SRAT: PXM 0 -> APIC 0x28 -> Node 0 Dec 13 14:34:32.649522 kernel: SRAT: PXM 0 -> APIC 0x2a -> Node 0 Dec 13 14:34:32.649527 kernel: SRAT: PXM 0 -> APIC 0x2c -> Node 0 Dec 13 14:34:32.649532 kernel: SRAT: PXM 0 -> APIC 0x2e -> Node 0 Dec 13 14:34:32.649537 kernel: SRAT: PXM 0 -> APIC 0x30 -> Node 0 Dec 13 14:34:32.649542 kernel: SRAT: PXM 0 -> APIC 0x32 -> Node 0 Dec 13 14:34:32.649547 kernel: SRAT: PXM 0 -> APIC 0x34 -> Node 0 Dec 13 14:34:32.649552 kernel: SRAT: PXM 0 -> APIC 0x36 -> Node 0 Dec 13 14:34:32.649563 kernel: SRAT: PXM 0 -> APIC 0x38 -> Node 0 Dec 13 14:34:32.649572 kernel: SRAT: PXM 0 -> APIC 0x3a -> Node 0 Dec 13 14:34:32.649578 kernel: SRAT: PXM 0 -> APIC 0x3c -> Node 0 Dec 13 14:34:32.649583 kernel: SRAT: PXM 0 -> APIC 0x3e -> Node 0 Dec 13 14:34:32.649588 kernel: SRAT: PXM 0 -> APIC 0x40 -> Node 0 Dec 13 14:34:32.649592 kernel: SRAT: PXM 0 -> APIC 0x42 -> Node 0 Dec 13 14:34:32.649597 kernel: SRAT: PXM 0 -> APIC 0x44 -> Node 0 Dec 13 14:34:32.649604 kernel: SRAT: PXM 0 -> APIC 0x46 -> Node 0 Dec 13 14:34:32.649608 kernel: SRAT: PXM 0 -> APIC 0x48 -> Node 0 Dec 13 14:34:32.649613 kernel: SRAT: PXM 0 -> APIC 0x4a -> Node 0 Dec 13 14:34:32.649618 kernel: SRAT: PXM 0 -> APIC 0x4c -> Node 0 Dec 13 14:34:32.649623 kernel: SRAT: PXM 0 -> APIC 0x4e -> Node 0 Dec 13 14:34:32.649627 kernel: SRAT: PXM 0 -> APIC 0x50 -> Node 0 Dec 13 14:34:32.649632 kernel: SRAT: PXM 0 -> APIC 0x52 -> Node 0 Dec 13 14:34:32.649636 kernel: SRAT: PXM 0 -> APIC 0x54 -> Node 0 Dec 13 14:34:32.649641 kernel: SRAT: PXM 0 -> APIC 0x56 -> Node 0 Dec 13 14:34:32.649646 kernel: SRAT: PXM 0 -> APIC 0x58 -> Node 0 Dec 13 14:34:32.649652 kernel: SRAT: PXM 0 -> APIC 0x5a -> Node 0 Dec 13 14:34:32.649657 kernel: SRAT: PXM 0 -> APIC 0x5c -> Node 0 Dec 13 14:34:32.649661 kernel: SRAT: PXM 0 -> APIC 0x5e -> Node 0 Dec 13 14:34:32.649666 kernel: SRAT: PXM 0 -> APIC 0x60 -> Node 0 Dec 13 14:34:32.649672 kernel: SRAT: PXM 0 -> APIC 0x62 -> Node 0 Dec 13 14:34:32.649679 kernel: SRAT: PXM 0 -> APIC 0x64 -> Node 0 Dec 13 14:34:32.649687 kernel: SRAT: PXM 0 -> APIC 0x66 -> Node 0 Dec 13 14:34:32.649693 kernel: SRAT: PXM 0 -> APIC 0x68 -> Node 0 Dec 13 14:34:32.649698 kernel: SRAT: PXM 0 -> APIC 0x6a -> Node 0 Dec 13 14:34:32.649702 kernel: SRAT: PXM 0 -> APIC 0x6c -> Node 0 Dec 13 14:34:32.649709 kernel: SRAT: PXM 0 -> APIC 0x6e -> Node 0 Dec 13 14:34:32.649714 kernel: SRAT: PXM 0 -> APIC 0x70 -> Node 0 Dec 13 14:34:32.649718 kernel: SRAT: PXM 0 -> APIC 0x72 -> Node 0 Dec 13 14:34:32.649723 kernel: SRAT: PXM 0 -> APIC 0x74 -> Node 0 Dec 13 14:34:32.649728 kernel: SRAT: PXM 0 -> APIC 0x76 -> Node 0 Dec 13 14:34:32.649733 kernel: SRAT: PXM 0 -> APIC 0x78 -> Node 0 Dec 13 14:34:32.649742 kernel: SRAT: PXM 0 -> APIC 0x7a -> Node 0 Dec 13 14:34:32.649747 kernel: SRAT: PXM 0 -> APIC 0x7c -> Node 0 Dec 13 14:34:32.649752 kernel: SRAT: PXM 0 -> APIC 0x7e -> Node 0 Dec 13 14:34:32.649757 kernel: SRAT: PXM 0 -> APIC 0x80 -> Node 0 Dec 13 14:34:32.649762 kernel: SRAT: PXM 0 -> APIC 0x82 -> Node 0 Dec 13 14:34:32.649768 kernel: SRAT: PXM 0 -> APIC 0x84 -> Node 0 Dec 13 14:34:32.649773 kernel: SRAT: PXM 0 -> APIC 0x86 -> Node 0 Dec 13 14:34:32.649778 kernel: SRAT: PXM 0 -> APIC 0x88 -> Node 0 Dec 13 14:34:32.649783 kernel: SRAT: PXM 0 -> APIC 0x8a -> Node 0 Dec 13 14:34:32.649788 kernel: SRAT: PXM 0 -> APIC 0x8c -> Node 0 Dec 13 14:34:32.649793 kernel: SRAT: PXM 0 -> APIC 0x8e -> Node 0 Dec 13 14:34:32.649798 kernel: SRAT: PXM 0 -> APIC 0x90 -> Node 0 Dec 13 14:34:32.649804 kernel: SRAT: PXM 0 -> APIC 0x92 -> Node 0 Dec 13 14:34:32.649809 kernel: SRAT: PXM 0 -> APIC 0x94 -> Node 0 Dec 13 14:34:32.649814 kernel: SRAT: PXM 0 -> APIC 0x96 -> Node 0 Dec 13 14:34:32.649843 kernel: SRAT: PXM 0 -> APIC 0x98 -> Node 0 Dec 13 14:34:32.649850 kernel: SRAT: PXM 0 -> APIC 0x9a -> Node 0 Dec 13 14:34:32.649856 kernel: SRAT: PXM 0 -> APIC 0x9c -> Node 0 Dec 13 14:34:32.649876 kernel: SRAT: PXM 0 -> APIC 0x9e -> Node 0 Dec 13 14:34:32.649882 kernel: SRAT: PXM 0 -> APIC 0xa0 -> Node 0 Dec 13 14:34:32.649887 kernel: SRAT: PXM 0 -> APIC 0xa2 -> Node 0 Dec 13 14:34:32.649892 kernel: SRAT: PXM 0 -> APIC 0xa4 -> Node 0 Dec 13 14:34:32.649898 kernel: SRAT: PXM 0 -> APIC 0xa6 -> Node 0 Dec 13 14:34:32.649903 kernel: SRAT: PXM 0 -> APIC 0xa8 -> Node 0 Dec 13 14:34:32.649909 kernel: SRAT: PXM 0 -> APIC 0xaa -> Node 0 Dec 13 14:34:32.649914 kernel: SRAT: PXM 0 -> APIC 0xac -> Node 0 Dec 13 14:34:32.649918 kernel: SRAT: PXM 0 -> APIC 0xae -> Node 0 Dec 13 14:34:32.649923 kernel: SRAT: PXM 0 -> APIC 0xb0 -> Node 0 Dec 13 14:34:32.649929 kernel: SRAT: PXM 0 -> APIC 0xb2 -> Node 0 Dec 13 14:34:32.649934 kernel: SRAT: PXM 0 -> APIC 0xb4 -> Node 0 Dec 13 14:34:32.649939 kernel: SRAT: PXM 0 -> APIC 0xb6 -> Node 0 Dec 13 14:34:32.649944 kernel: SRAT: PXM 0 -> APIC 0xb8 -> Node 0 Dec 13 14:34:32.649950 kernel: SRAT: PXM 0 -> APIC 0xba -> Node 0 Dec 13 14:34:32.649955 kernel: SRAT: PXM 0 -> APIC 0xbc -> Node 0 Dec 13 14:34:32.649960 kernel: SRAT: PXM 0 -> APIC 0xbe -> Node 0 Dec 13 14:34:32.649966 kernel: SRAT: PXM 0 -> APIC 0xc0 -> Node 0 Dec 13 14:34:32.649974 kernel: SRAT: PXM 0 -> APIC 0xc2 -> Node 0 Dec 13 14:34:32.649980 kernel: SRAT: PXM 0 -> APIC 0xc4 -> Node 0 Dec 13 14:34:32.649985 kernel: SRAT: PXM 0 -> APIC 0xc6 -> Node 0 Dec 13 14:34:32.649990 kernel: SRAT: PXM 0 -> APIC 0xc8 -> Node 0 Dec 13 14:34:32.649995 kernel: SRAT: PXM 0 -> APIC 0xca -> Node 0 Dec 13 14:34:32.650000 kernel: SRAT: PXM 0 -> APIC 0xcc -> Node 0 Dec 13 14:34:32.650007 kernel: SRAT: PXM 0 -> APIC 0xce -> Node 0 Dec 13 14:34:32.650012 kernel: SRAT: PXM 0 -> APIC 0xd0 -> Node 0 Dec 13 14:34:32.650017 kernel: SRAT: PXM 0 -> APIC 0xd2 -> Node 0 Dec 13 14:34:32.650022 kernel: SRAT: PXM 0 -> APIC 0xd4 -> Node 0 Dec 13 14:34:32.650027 kernel: SRAT: PXM 0 -> APIC 0xd6 -> Node 0 Dec 13 14:34:32.650032 kernel: SRAT: PXM 0 -> APIC 0xd8 -> Node 0 Dec 13 14:34:32.650037 kernel: SRAT: PXM 0 -> APIC 0xda -> Node 0 Dec 13 14:34:32.650042 kernel: SRAT: PXM 0 -> APIC 0xdc -> Node 0 Dec 13 14:34:32.650047 kernel: SRAT: PXM 0 -> APIC 0xde -> Node 0 Dec 13 14:34:32.650053 kernel: SRAT: PXM 0 -> APIC 0xe0 -> Node 0 Dec 13 14:34:32.650058 kernel: SRAT: PXM 0 -> APIC 0xe2 -> Node 0 Dec 13 14:34:32.650063 kernel: SRAT: PXM 0 -> APIC 0xe4 -> Node 0 Dec 13 14:34:32.650068 kernel: SRAT: PXM 0 -> APIC 0xe6 -> Node 0 Dec 13 14:34:32.650073 kernel: SRAT: PXM 0 -> APIC 0xe8 -> Node 0 Dec 13 14:34:32.650078 kernel: SRAT: PXM 0 -> APIC 0xea -> Node 0 Dec 13 14:34:32.650083 kernel: SRAT: PXM 0 -> APIC 0xec -> Node 0 Dec 13 14:34:32.650088 kernel: SRAT: PXM 0 -> APIC 0xee -> Node 0 Dec 13 14:34:32.650093 kernel: SRAT: PXM 0 -> APIC 0xf0 -> Node 0 Dec 13 14:34:32.650098 kernel: SRAT: PXM 0 -> APIC 0xf2 -> Node 0 Dec 13 14:34:32.650104 kernel: SRAT: PXM 0 -> APIC 0xf4 -> Node 0 Dec 13 14:34:32.650109 kernel: SRAT: PXM 0 -> APIC 0xf6 -> Node 0 Dec 13 14:34:32.650114 kernel: SRAT: PXM 0 -> APIC 0xf8 -> Node 0 Dec 13 14:34:32.650120 kernel: SRAT: PXM 0 -> APIC 0xfa -> Node 0 Dec 13 14:34:32.650125 kernel: SRAT: PXM 0 -> APIC 0xfc -> Node 0 Dec 13 14:34:32.650130 kernel: SRAT: PXM 0 -> APIC 0xfe -> Node 0 Dec 13 14:34:32.650135 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Dec 13 14:34:32.650140 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Dec 13 14:34:32.650146 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000-0xbfffffff] hotplug Dec 13 14:34:32.650151 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7fffffff] -> [mem 0x00000000-0x7fffffff] Dec 13 14:34:32.650157 kernel: NODE_DATA(0) allocated [mem 0x7fffa000-0x7fffffff] Dec 13 14:34:32.650163 kernel: Zone ranges: Dec 13 14:34:32.650168 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 14:34:32.650173 kernel: DMA32 [mem 0x0000000001000000-0x000000007fffffff] Dec 13 14:34:32.650178 kernel: Normal empty Dec 13 14:34:32.650183 kernel: Movable zone start for each node Dec 13 14:34:32.650189 kernel: Early memory node ranges Dec 13 14:34:32.650194 kernel: node 0: [mem 0x0000000000001000-0x000000000009dfff] Dec 13 14:34:32.650199 kernel: node 0: [mem 0x0000000000100000-0x000000007fedffff] Dec 13 14:34:32.650205 kernel: node 0: [mem 0x000000007ff00000-0x000000007fffffff] Dec 13 14:34:32.650210 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007fffffff] Dec 13 14:34:32.650215 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 14:34:32.650221 kernel: On node 0, zone DMA: 98 pages in unavailable ranges Dec 13 14:34:32.650226 kernel: On node 0, zone DMA32: 32 pages in unavailable ranges Dec 13 14:34:32.650231 kernel: ACPI: PM-Timer IO Port: 0x1008 Dec 13 14:34:32.650236 kernel: system APIC only can use physical flat Dec 13 14:34:32.650241 kernel: ACPI: LAPIC_NMI (acpi_id[0x00] high edge lint[0x1]) Dec 13 14:34:32.650246 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] high edge lint[0x1]) Dec 13 14:34:32.650251 kernel: ACPI: LAPIC_NMI (acpi_id[0x02] high edge lint[0x1]) Dec 13 14:34:32.650258 kernel: ACPI: LAPIC_NMI (acpi_id[0x03] high edge lint[0x1]) Dec 13 14:34:32.650263 kernel: ACPI: LAPIC_NMI (acpi_id[0x04] high edge lint[0x1]) Dec 13 14:34:32.650268 kernel: ACPI: LAPIC_NMI (acpi_id[0x05] high edge lint[0x1]) Dec 13 14:34:32.650273 kernel: ACPI: LAPIC_NMI (acpi_id[0x06] high edge lint[0x1]) Dec 13 14:34:32.650278 kernel: ACPI: LAPIC_NMI (acpi_id[0x07] high edge lint[0x1]) Dec 13 14:34:32.650283 kernel: ACPI: LAPIC_NMI (acpi_id[0x08] high edge lint[0x1]) Dec 13 14:34:32.650288 kernel: ACPI: LAPIC_NMI (acpi_id[0x09] high edge lint[0x1]) Dec 13 14:34:32.650293 kernel: ACPI: LAPIC_NMI (acpi_id[0x0a] high edge lint[0x1]) Dec 13 14:34:32.650298 kernel: ACPI: LAPIC_NMI (acpi_id[0x0b] high edge lint[0x1]) Dec 13 14:34:32.650304 kernel: ACPI: LAPIC_NMI (acpi_id[0x0c] high edge lint[0x1]) Dec 13 14:34:32.650309 kernel: ACPI: LAPIC_NMI (acpi_id[0x0d] high edge lint[0x1]) Dec 13 14:34:32.650314 kernel: ACPI: LAPIC_NMI (acpi_id[0x0e] high edge lint[0x1]) Dec 13 14:34:32.650319 kernel: ACPI: LAPIC_NMI (acpi_id[0x0f] high edge lint[0x1]) Dec 13 14:34:32.650324 kernel: ACPI: LAPIC_NMI (acpi_id[0x10] high edge lint[0x1]) Dec 13 14:34:32.650329 kernel: ACPI: LAPIC_NMI (acpi_id[0x11] high edge lint[0x1]) Dec 13 14:34:32.650334 kernel: ACPI: LAPIC_NMI (acpi_id[0x12] high edge lint[0x1]) Dec 13 14:34:32.650340 kernel: ACPI: LAPIC_NMI (acpi_id[0x13] high edge lint[0x1]) Dec 13 14:34:32.650345 kernel: ACPI: LAPIC_NMI (acpi_id[0x14] high edge lint[0x1]) Dec 13 14:34:32.650350 kernel: ACPI: LAPIC_NMI (acpi_id[0x15] high edge lint[0x1]) Dec 13 14:34:32.650356 kernel: ACPI: LAPIC_NMI (acpi_id[0x16] high edge lint[0x1]) Dec 13 14:34:32.650361 kernel: ACPI: LAPIC_NMI (acpi_id[0x17] high edge lint[0x1]) Dec 13 14:34:32.650366 kernel: ACPI: LAPIC_NMI (acpi_id[0x18] high edge lint[0x1]) Dec 13 14:34:32.650371 kernel: ACPI: LAPIC_NMI (acpi_id[0x19] high edge lint[0x1]) Dec 13 14:34:32.650376 kernel: ACPI: LAPIC_NMI (acpi_id[0x1a] high edge lint[0x1]) Dec 13 14:34:32.650381 kernel: ACPI: LAPIC_NMI (acpi_id[0x1b] high edge lint[0x1]) Dec 13 14:34:32.650386 kernel: ACPI: LAPIC_NMI (acpi_id[0x1c] high edge lint[0x1]) Dec 13 14:34:32.650391 kernel: ACPI: LAPIC_NMI (acpi_id[0x1d] high edge lint[0x1]) Dec 13 14:34:32.650396 kernel: ACPI: LAPIC_NMI (acpi_id[0x1e] high edge lint[0x1]) Dec 13 14:34:32.650403 kernel: ACPI: LAPIC_NMI (acpi_id[0x1f] high edge lint[0x1]) Dec 13 14:34:32.650408 kernel: ACPI: LAPIC_NMI (acpi_id[0x20] high edge lint[0x1]) Dec 13 14:34:32.650413 kernel: ACPI: LAPIC_NMI (acpi_id[0x21] high edge lint[0x1]) Dec 13 14:34:32.650418 kernel: ACPI: LAPIC_NMI (acpi_id[0x22] high edge lint[0x1]) Dec 13 14:34:32.650423 kernel: ACPI: LAPIC_NMI (acpi_id[0x23] high edge lint[0x1]) Dec 13 14:34:32.650428 kernel: ACPI: LAPIC_NMI (acpi_id[0x24] high edge lint[0x1]) Dec 13 14:34:32.650433 kernel: ACPI: LAPIC_NMI (acpi_id[0x25] high edge lint[0x1]) Dec 13 14:34:32.650438 kernel: ACPI: LAPIC_NMI (acpi_id[0x26] high edge lint[0x1]) Dec 13 14:34:32.650443 kernel: ACPI: LAPIC_NMI (acpi_id[0x27] high edge lint[0x1]) Dec 13 14:34:32.650448 kernel: ACPI: LAPIC_NMI (acpi_id[0x28] high edge lint[0x1]) Dec 13 14:34:32.650454 kernel: ACPI: LAPIC_NMI (acpi_id[0x29] high edge lint[0x1]) Dec 13 14:34:32.650460 kernel: ACPI: LAPIC_NMI (acpi_id[0x2a] high edge lint[0x1]) Dec 13 14:34:32.650465 kernel: ACPI: LAPIC_NMI (acpi_id[0x2b] high edge lint[0x1]) Dec 13 14:34:32.650470 kernel: ACPI: LAPIC_NMI (acpi_id[0x2c] high edge lint[0x1]) Dec 13 14:34:32.650475 kernel: ACPI: LAPIC_NMI (acpi_id[0x2d] high edge lint[0x1]) Dec 13 14:34:32.650480 kernel: ACPI: LAPIC_NMI (acpi_id[0x2e] high edge lint[0x1]) Dec 13 14:34:32.650485 kernel: ACPI: LAPIC_NMI (acpi_id[0x2f] high edge lint[0x1]) Dec 13 14:34:32.650490 kernel: ACPI: LAPIC_NMI (acpi_id[0x30] high edge lint[0x1]) Dec 13 14:34:32.650495 kernel: ACPI: LAPIC_NMI (acpi_id[0x31] high edge lint[0x1]) Dec 13 14:34:32.650502 kernel: ACPI: LAPIC_NMI (acpi_id[0x32] high edge lint[0x1]) Dec 13 14:34:32.650510 kernel: ACPI: LAPIC_NMI (acpi_id[0x33] high edge lint[0x1]) Dec 13 14:34:32.650515 kernel: ACPI: LAPIC_NMI (acpi_id[0x34] high edge lint[0x1]) Dec 13 14:34:32.650521 kernel: ACPI: LAPIC_NMI (acpi_id[0x35] high edge lint[0x1]) Dec 13 14:34:32.650526 kernel: ACPI: LAPIC_NMI (acpi_id[0x36] high edge lint[0x1]) Dec 13 14:34:32.650531 kernel: ACPI: LAPIC_NMI (acpi_id[0x37] high edge lint[0x1]) Dec 13 14:34:32.650536 kernel: ACPI: LAPIC_NMI (acpi_id[0x38] high edge lint[0x1]) Dec 13 14:34:32.650541 kernel: ACPI: LAPIC_NMI (acpi_id[0x39] high edge lint[0x1]) Dec 13 14:34:32.650546 kernel: ACPI: LAPIC_NMI (acpi_id[0x3a] high edge lint[0x1]) Dec 13 14:34:32.650551 kernel: ACPI: LAPIC_NMI (acpi_id[0x3b] high edge lint[0x1]) Dec 13 14:34:32.650596 kernel: ACPI: LAPIC_NMI (acpi_id[0x3c] high edge lint[0x1]) Dec 13 14:34:32.650602 kernel: ACPI: LAPIC_NMI (acpi_id[0x3d] high edge lint[0x1]) Dec 13 14:34:32.650607 kernel: ACPI: LAPIC_NMI (acpi_id[0x3e] high edge lint[0x1]) Dec 13 14:34:32.650612 kernel: ACPI: LAPIC_NMI (acpi_id[0x3f] high edge lint[0x1]) Dec 13 14:34:32.650618 kernel: ACPI: LAPIC_NMI (acpi_id[0x40] high edge lint[0x1]) Dec 13 14:34:32.650625 kernel: ACPI: LAPIC_NMI (acpi_id[0x41] high edge lint[0x1]) Dec 13 14:34:32.650632 kernel: ACPI: LAPIC_NMI (acpi_id[0x42] high edge lint[0x1]) Dec 13 14:34:32.650638 kernel: ACPI: LAPIC_NMI (acpi_id[0x43] high edge lint[0x1]) Dec 13 14:34:32.650643 kernel: ACPI: LAPIC_NMI (acpi_id[0x44] high edge lint[0x1]) Dec 13 14:34:32.650650 kernel: ACPI: LAPIC_NMI (acpi_id[0x45] high edge lint[0x1]) Dec 13 14:34:32.650655 kernel: ACPI: LAPIC_NMI (acpi_id[0x46] high edge lint[0x1]) Dec 13 14:34:32.650661 kernel: ACPI: LAPIC_NMI (acpi_id[0x47] high edge lint[0x1]) Dec 13 14:34:32.650666 kernel: ACPI: LAPIC_NMI (acpi_id[0x48] high edge lint[0x1]) Dec 13 14:34:32.650671 kernel: ACPI: LAPIC_NMI (acpi_id[0x49] high edge lint[0x1]) Dec 13 14:34:32.650676 kernel: ACPI: LAPIC_NMI (acpi_id[0x4a] high edge lint[0x1]) Dec 13 14:34:32.650681 kernel: ACPI: LAPIC_NMI (acpi_id[0x4b] high edge lint[0x1]) Dec 13 14:34:32.650686 kernel: ACPI: LAPIC_NMI (acpi_id[0x4c] high edge lint[0x1]) Dec 13 14:34:32.650691 kernel: ACPI: LAPIC_NMI (acpi_id[0x4d] high edge lint[0x1]) Dec 13 14:34:32.650697 kernel: ACPI: LAPIC_NMI (acpi_id[0x4e] high edge lint[0x1]) Dec 13 14:34:32.650702 kernel: ACPI: LAPIC_NMI (acpi_id[0x4f] high edge lint[0x1]) Dec 13 14:34:32.650707 kernel: ACPI: LAPIC_NMI (acpi_id[0x50] high edge lint[0x1]) Dec 13 14:34:32.650713 kernel: ACPI: LAPIC_NMI (acpi_id[0x51] high edge lint[0x1]) Dec 13 14:34:32.650718 kernel: ACPI: LAPIC_NMI (acpi_id[0x52] high edge lint[0x1]) Dec 13 14:34:32.650723 kernel: ACPI: LAPIC_NMI (acpi_id[0x53] high edge lint[0x1]) Dec 13 14:34:32.650728 kernel: ACPI: LAPIC_NMI (acpi_id[0x54] high edge lint[0x1]) Dec 13 14:34:32.650735 kernel: ACPI: LAPIC_NMI (acpi_id[0x55] high edge lint[0x1]) Dec 13 14:34:32.650743 kernel: ACPI: LAPIC_NMI (acpi_id[0x56] high edge lint[0x1]) Dec 13 14:34:32.650748 kernel: ACPI: LAPIC_NMI (acpi_id[0x57] high edge lint[0x1]) Dec 13 14:34:32.650754 kernel: ACPI: LAPIC_NMI (acpi_id[0x58] high edge lint[0x1]) Dec 13 14:34:32.650759 kernel: ACPI: LAPIC_NMI (acpi_id[0x59] high edge lint[0x1]) Dec 13 14:34:32.650764 kernel: ACPI: LAPIC_NMI (acpi_id[0x5a] high edge lint[0x1]) Dec 13 14:34:32.650769 kernel: ACPI: LAPIC_NMI (acpi_id[0x5b] high edge lint[0x1]) Dec 13 14:34:32.650774 kernel: ACPI: LAPIC_NMI (acpi_id[0x5c] high edge lint[0x1]) Dec 13 14:34:32.650779 kernel: ACPI: LAPIC_NMI (acpi_id[0x5d] high edge lint[0x1]) Dec 13 14:34:32.650784 kernel: ACPI: LAPIC_NMI (acpi_id[0x5e] high edge lint[0x1]) Dec 13 14:34:32.650789 kernel: ACPI: LAPIC_NMI (acpi_id[0x5f] high edge lint[0x1]) Dec 13 14:34:32.650795 kernel: ACPI: LAPIC_NMI (acpi_id[0x60] high edge lint[0x1]) Dec 13 14:34:32.650801 kernel: ACPI: LAPIC_NMI (acpi_id[0x61] high edge lint[0x1]) Dec 13 14:34:32.650806 kernel: ACPI: LAPIC_NMI (acpi_id[0x62] high edge lint[0x1]) Dec 13 14:34:32.650814 kernel: ACPI: LAPIC_NMI (acpi_id[0x63] high edge lint[0x1]) Dec 13 14:34:32.650819 kernel: ACPI: LAPIC_NMI (acpi_id[0x64] high edge lint[0x1]) Dec 13 14:34:32.650824 kernel: ACPI: LAPIC_NMI (acpi_id[0x65] high edge lint[0x1]) Dec 13 14:34:32.650831 kernel: ACPI: LAPIC_NMI (acpi_id[0x66] high edge lint[0x1]) Dec 13 14:34:32.650839 kernel: ACPI: LAPIC_NMI (acpi_id[0x67] high edge lint[0x1]) Dec 13 14:34:32.650844 kernel: ACPI: LAPIC_NMI (acpi_id[0x68] high edge lint[0x1]) Dec 13 14:34:32.650849 kernel: ACPI: LAPIC_NMI (acpi_id[0x69] high edge lint[0x1]) Dec 13 14:34:32.650854 kernel: ACPI: LAPIC_NMI (acpi_id[0x6a] high edge lint[0x1]) Dec 13 14:34:32.650860 kernel: ACPI: LAPIC_NMI (acpi_id[0x6b] high edge lint[0x1]) Dec 13 14:34:32.650865 kernel: ACPI: LAPIC_NMI (acpi_id[0x6c] high edge lint[0x1]) Dec 13 14:34:32.650871 kernel: ACPI: LAPIC_NMI (acpi_id[0x6d] high edge lint[0x1]) Dec 13 14:34:32.650876 kernel: ACPI: LAPIC_NMI (acpi_id[0x6e] high edge lint[0x1]) Dec 13 14:34:32.650881 kernel: ACPI: LAPIC_NMI (acpi_id[0x6f] high edge lint[0x1]) Dec 13 14:34:32.650886 kernel: ACPI: LAPIC_NMI (acpi_id[0x70] high edge lint[0x1]) Dec 13 14:34:32.650891 kernel: ACPI: LAPIC_NMI (acpi_id[0x71] high edge lint[0x1]) Dec 13 14:34:32.650896 kernel: ACPI: LAPIC_NMI (acpi_id[0x72] high edge lint[0x1]) Dec 13 14:34:32.650901 kernel: ACPI: LAPIC_NMI (acpi_id[0x73] high edge lint[0x1]) Dec 13 14:34:32.650907 kernel: ACPI: LAPIC_NMI (acpi_id[0x74] high edge lint[0x1]) Dec 13 14:34:32.650912 kernel: ACPI: LAPIC_NMI (acpi_id[0x75] high edge lint[0x1]) Dec 13 14:34:32.650917 kernel: ACPI: LAPIC_NMI (acpi_id[0x76] high edge lint[0x1]) Dec 13 14:34:32.650922 kernel: ACPI: LAPIC_NMI (acpi_id[0x77] high edge lint[0x1]) Dec 13 14:34:32.650927 kernel: ACPI: LAPIC_NMI (acpi_id[0x78] high edge lint[0x1]) Dec 13 14:34:32.650932 kernel: ACPI: LAPIC_NMI (acpi_id[0x79] high edge lint[0x1]) Dec 13 14:34:32.650937 kernel: ACPI: LAPIC_NMI (acpi_id[0x7a] high edge lint[0x1]) Dec 13 14:34:32.650943 kernel: ACPI: LAPIC_NMI (acpi_id[0x7b] high edge lint[0x1]) Dec 13 14:34:32.650948 kernel: ACPI: LAPIC_NMI (acpi_id[0x7c] high edge lint[0x1]) Dec 13 14:34:32.650953 kernel: ACPI: LAPIC_NMI (acpi_id[0x7d] high edge lint[0x1]) Dec 13 14:34:32.650959 kernel: ACPI: LAPIC_NMI (acpi_id[0x7e] high edge lint[0x1]) Dec 13 14:34:32.650964 kernel: ACPI: LAPIC_NMI (acpi_id[0x7f] high edge lint[0x1]) Dec 13 14:34:32.650969 kernel: IOAPIC[0]: apic_id 1, version 17, address 0xfec00000, GSI 0-23 Dec 13 14:34:32.650974 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 high edge) Dec 13 14:34:32.650979 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 14:34:32.650984 kernel: ACPI: HPET id: 0x8086af01 base: 0xfed00000 Dec 13 14:34:32.650989 kernel: TSC deadline timer available Dec 13 14:34:32.650994 kernel: smpboot: Allowing 128 CPUs, 126 hotplug CPUs Dec 13 14:34:32.651000 kernel: [mem 0x80000000-0xefffffff] available for PCI devices Dec 13 14:34:32.651006 kernel: Booting paravirtualized kernel on VMware hypervisor Dec 13 14:34:32.651011 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 14:34:32.651016 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:128 nr_node_ids:1 Dec 13 14:34:32.651021 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u262144 Dec 13 14:34:32.651027 kernel: pcpu-alloc: s188696 r8192 d32488 u262144 alloc=1*2097152 Dec 13 14:34:32.651031 kernel: pcpu-alloc: [0] 000 001 002 003 004 005 006 007 Dec 13 14:34:32.651037 kernel: pcpu-alloc: [0] 008 009 010 011 012 013 014 015 Dec 13 14:34:32.651042 kernel: pcpu-alloc: [0] 016 017 018 019 020 021 022 023 Dec 13 14:34:32.651047 kernel: pcpu-alloc: [0] 024 025 026 027 028 029 030 031 Dec 13 14:34:32.651053 kernel: pcpu-alloc: [0] 032 033 034 035 036 037 038 039 Dec 13 14:34:32.651058 kernel: pcpu-alloc: [0] 040 041 042 043 044 045 046 047 Dec 13 14:34:32.651063 kernel: pcpu-alloc: [0] 048 049 050 051 052 053 054 055 Dec 13 14:34:32.651075 kernel: pcpu-alloc: [0] 056 057 058 059 060 061 062 063 Dec 13 14:34:32.651081 kernel: pcpu-alloc: [0] 064 065 066 067 068 069 070 071 Dec 13 14:34:32.651087 kernel: pcpu-alloc: [0] 072 073 074 075 076 077 078 079 Dec 13 14:34:32.651092 kernel: pcpu-alloc: [0] 080 081 082 083 084 085 086 087 Dec 13 14:34:32.651097 kernel: pcpu-alloc: [0] 088 089 090 091 092 093 094 095 Dec 13 14:34:32.651104 kernel: pcpu-alloc: [0] 096 097 098 099 100 101 102 103 Dec 13 14:34:32.651109 kernel: pcpu-alloc: [0] 104 105 106 107 108 109 110 111 Dec 13 14:34:32.651114 kernel: pcpu-alloc: [0] 112 113 114 115 116 117 118 119 Dec 13 14:34:32.651119 kernel: pcpu-alloc: [0] 120 121 122 123 124 125 126 127 Dec 13 14:34:32.651125 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515808 Dec 13 14:34:32.651130 kernel: Policy zone: DMA32 Dec 13 14:34:32.651137 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:32.651143 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:34:32.651148 kernel: printk: log_buf_len individual max cpu contribution: 4096 bytes Dec 13 14:34:32.651155 kernel: printk: log_buf_len total cpu_extra contributions: 520192 bytes Dec 13 14:34:32.651160 kernel: printk: log_buf_len min size: 262144 bytes Dec 13 14:34:32.651166 kernel: printk: log_buf_len: 1048576 bytes Dec 13 14:34:32.651171 kernel: printk: early log buf free: 239728(91%) Dec 13 14:34:32.651177 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:34:32.651182 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 14:34:32.651188 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:34:32.651194 kernel: Memory: 1940392K/2096628K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47472K init, 4112K bss, 155976K reserved, 0K cma-reserved) Dec 13 14:34:32.651199 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=128, Nodes=1 Dec 13 14:34:32.651206 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 14:34:32.651211 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 14:34:32.651220 kernel: rcu: Hierarchical RCU implementation. Dec 13 14:34:32.651229 kernel: rcu: RCU event tracing is enabled. Dec 13 14:34:32.651237 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=128. Dec 13 14:34:32.651246 kernel: Rude variant of Tasks RCU enabled. Dec 13 14:34:32.651253 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:34:32.651259 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:34:32.651265 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=128 Dec 13 14:34:32.651270 kernel: NR_IRQS: 33024, nr_irqs: 1448, preallocated irqs: 16 Dec 13 14:34:32.651276 kernel: random: crng init done Dec 13 14:34:32.651281 kernel: Console: colour VGA+ 80x25 Dec 13 14:34:32.651287 kernel: printk: console [tty0] enabled Dec 13 14:34:32.651292 kernel: printk: console [ttyS0] enabled Dec 13 14:34:32.651298 kernel: ACPI: Core revision 20210730 Dec 13 14:34:32.651304 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 133484882848 ns Dec 13 14:34:32.651310 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 14:34:32.651316 kernel: x2apic enabled Dec 13 14:34:32.651321 kernel: Switched APIC routing to physical x2apic. Dec 13 14:34:32.651327 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Dec 13 14:34:32.651333 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:34:32.651338 kernel: Calibrating delay loop (skipped) preset value.. 6816.00 BogoMIPS (lpj=3408000) Dec 13 14:34:32.651344 kernel: Disabled fast string operations Dec 13 14:34:32.651349 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 14:34:32.651355 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 14:34:32.651362 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 14:34:32.651368 kernel: Spectre V2 : WARNING: Unprivileged eBPF is enabled with eIBRS on, data leaks possible via Spectre v2 BHB attacks! Dec 13 14:34:32.651373 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit Dec 13 14:34:32.651379 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall Dec 13 14:34:32.651384 kernel: Spectre V2 : Mitigation: Enhanced / Automatic IBRS Dec 13 14:34:32.651390 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 14:34:32.651395 kernel: Spectre V2 : Spectre v2 / PBRSB-eIBRS: Retire a single CALL on VMEXIT Dec 13 14:34:32.651402 kernel: RETBleed: Mitigation: Enhanced IBRS Dec 13 14:34:32.651408 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Dec 13 14:34:32.651413 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Dec 13 14:34:32.651419 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 14:34:32.651424 kernel: SRBDS: Unknown: Dependent on hypervisor status Dec 13 14:34:32.651430 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 14:34:32.651435 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 14:34:32.651443 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 14:34:32.651450 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 14:34:32.651457 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 14:34:32.651462 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'compacted' format. Dec 13 14:34:32.651468 kernel: Freeing SMP alternatives memory: 32K Dec 13 14:34:32.651474 kernel: pid_max: default: 131072 minimum: 1024 Dec 13 14:34:32.651479 kernel: LSM: Security Framework initializing Dec 13 14:34:32.651485 kernel: SELinux: Initializing. Dec 13 14:34:32.651490 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:34:32.651496 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Dec 13 14:34:32.651501 kernel: smpboot: CPU0: Intel(R) Xeon(R) E-2278G CPU @ 3.40GHz (family: 0x6, model: 0x9e, stepping: 0xd) Dec 13 14:34:32.651508 kernel: Performance Events: Skylake events, core PMU driver. Dec 13 14:34:32.651514 kernel: core: CPUID marked event: 'cpu cycles' unavailable Dec 13 14:34:32.651519 kernel: core: CPUID marked event: 'instructions' unavailable Dec 13 14:34:32.651524 kernel: core: CPUID marked event: 'bus cycles' unavailable Dec 13 14:34:32.651530 kernel: core: CPUID marked event: 'cache references' unavailable Dec 13 14:34:32.651535 kernel: core: CPUID marked event: 'cache misses' unavailable Dec 13 14:34:32.651540 kernel: core: CPUID marked event: 'branch instructions' unavailable Dec 13 14:34:32.651546 kernel: core: CPUID marked event: 'branch misses' unavailable Dec 13 14:34:32.651552 kernel: ... version: 1 Dec 13 14:34:32.651564 kernel: ... bit width: 48 Dec 13 14:34:32.651569 kernel: ... generic registers: 4 Dec 13 14:34:32.651575 kernel: ... value mask: 0000ffffffffffff Dec 13 14:34:32.651580 kernel: ... max period: 000000007fffffff Dec 13 14:34:32.651586 kernel: ... fixed-purpose events: 0 Dec 13 14:34:32.651591 kernel: ... event mask: 000000000000000f Dec 13 14:34:32.651596 kernel: signal: max sigframe size: 1776 Dec 13 14:34:32.651602 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:34:32.651608 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 14:34:32.651614 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:34:32.651620 kernel: x86: Booting SMP configuration: Dec 13 14:34:32.651625 kernel: .... node #0, CPUs: #1 Dec 13 14:34:32.651631 kernel: Disabled fast string operations Dec 13 14:34:32.651636 kernel: smpboot: CPU 1 Converting physical 2 to logical package 1 Dec 13 14:34:32.651641 kernel: smpboot: CPU 1 Converting physical 0 to logical die 1 Dec 13 14:34:32.651647 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:34:32.651652 kernel: smpboot: Max logical packages: 128 Dec 13 14:34:32.651658 kernel: smpboot: Total of 2 processors activated (13632.00 BogoMIPS) Dec 13 14:34:32.651664 kernel: devtmpfs: initialized Dec 13 14:34:32.651670 kernel: x86/mm: Memory block size: 128MB Dec 13 14:34:32.651675 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x7feff000-0x7fefffff] (4096 bytes) Dec 13 14:34:32.651681 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:34:32.651689 kernel: futex hash table entries: 32768 (order: 9, 2097152 bytes, linear) Dec 13 14:34:32.651697 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:34:32.651702 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:34:32.651708 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:34:32.651713 kernel: audit: type=2000 audit(1734100471.059:1): state=initialized audit_enabled=0 res=1 Dec 13 14:34:32.651720 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:34:32.651726 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 14:34:32.651731 kernel: cpuidle: using governor menu Dec 13 14:34:32.651737 kernel: Simple Boot Flag at 0x36 set to 0x80 Dec 13 14:34:32.651742 kernel: ACPI: bus type PCI registered Dec 13 14:34:32.651748 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:34:32.651754 kernel: dca service started, version 1.12.1 Dec 13 14:34:32.651760 kernel: PCI: MMCONFIG for domain 0000 [bus 00-7f] at [mem 0xf0000000-0xf7ffffff] (base 0xf0000000) Dec 13 14:34:32.651766 kernel: PCI: MMCONFIG at [mem 0xf0000000-0xf7ffffff] reserved in E820 Dec 13 14:34:32.651772 kernel: PCI: Using configuration type 1 for base access Dec 13 14:34:32.651778 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 14:34:32.651783 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:34:32.651789 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:34:32.651794 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:34:32.651800 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:34:32.651805 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:34:32.651810 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:34:32.651816 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:34:32.651821 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:34:32.651828 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:34:32.651833 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:34:32.651839 kernel: ACPI: [Firmware Bug]: BIOS _OSI(Linux) query ignored Dec 13 14:34:32.651844 kernel: ACPI: Interpreter enabled Dec 13 14:34:32.651850 kernel: ACPI: PM: (supports S0 S1 S5) Dec 13 14:34:32.651856 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 14:34:32.651861 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 14:34:32.651867 kernel: ACPI: Enabled 4 GPEs in block 00 to 0F Dec 13 14:34:32.651873 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-7f]) Dec 13 14:34:32.651946 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Dec 13 14:34:32.651996 kernel: acpi PNP0A03:00: _OSC: platform does not support [AER LTR] Dec 13 14:34:32.652041 kernel: acpi PNP0A03:00: _OSC: OS now controls [PCIeHotplug PME PCIeCapability] Dec 13 14:34:32.652049 kernel: PCI host bridge to bus 0000:00 Dec 13 14:34:32.652096 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Dec 13 14:34:32.652148 kernel: pci_bus 0000:00: root bus resource [mem 0x000cc000-0x000cffff window] Dec 13 14:34:32.652192 kernel: pci_bus 0000:00: root bus resource [mem 0x000d0000-0x000d3fff window] Dec 13 14:34:32.652239 kernel: pci_bus 0000:00: root bus resource [mem 0x000d4000-0x000d7fff window] Dec 13 14:34:32.652286 kernel: pci_bus 0000:00: root bus resource [mem 0x000d8000-0x000dbfff window] Dec 13 14:34:32.652327 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] Dec 13 14:34:32.652367 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Dec 13 14:34:32.652406 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xfeff window] Dec 13 14:34:32.652445 kernel: pci_bus 0000:00: root bus resource [bus 00-7f] Dec 13 14:34:32.652509 kernel: pci 0000:00:00.0: [8086:7190] type 00 class 0x060000 Dec 13 14:34:32.652574 kernel: pci 0000:00:01.0: [8086:7191] type 01 class 0x060400 Dec 13 14:34:32.652635 kernel: pci 0000:00:07.0: [8086:7110] type 00 class 0x060100 Dec 13 14:34:32.652694 kernel: pci 0000:00:07.1: [8086:7111] type 00 class 0x01018a Dec 13 14:34:32.652751 kernel: pci 0000:00:07.1: reg 0x20: [io 0x1060-0x106f] Dec 13 14:34:32.652798 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Dec 13 14:34:32.652847 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Dec 13 14:34:32.652892 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Dec 13 14:34:32.652937 kernel: pci 0000:00:07.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Dec 13 14:34:32.652987 kernel: pci 0000:00:07.3: [8086:7113] type 00 class 0x068000 Dec 13 14:34:32.653039 kernel: pci 0000:00:07.3: quirk: [io 0x1000-0x103f] claimed by PIIX4 ACPI Dec 13 14:34:32.653087 kernel: pci 0000:00:07.3: quirk: [io 0x1040-0x104f] claimed by PIIX4 SMB Dec 13 14:34:32.653136 kernel: pci 0000:00:07.7: [15ad:0740] type 00 class 0x088000 Dec 13 14:34:32.653185 kernel: pci 0000:00:07.7: reg 0x10: [io 0x1080-0x10bf] Dec 13 14:34:32.653240 kernel: pci 0000:00:07.7: reg 0x14: [mem 0xfebfe000-0xfebfffff 64bit] Dec 13 14:34:32.653291 kernel: pci 0000:00:0f.0: [15ad:0405] type 00 class 0x030000 Dec 13 14:34:32.653344 kernel: pci 0000:00:0f.0: reg 0x10: [io 0x1070-0x107f] Dec 13 14:34:32.653390 kernel: pci 0000:00:0f.0: reg 0x14: [mem 0xe8000000-0xefffffff pref] Dec 13 14:34:32.653435 kernel: pci 0000:00:0f.0: reg 0x18: [mem 0xfe000000-0xfe7fffff] Dec 13 14:34:32.653492 kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x00007fff pref] Dec 13 14:34:32.653539 kernel: pci 0000:00:0f.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Dec 13 14:34:32.658655 kernel: pci 0000:00:11.0: [15ad:0790] type 01 class 0x060401 Dec 13 14:34:32.661915 kernel: pci 0000:00:15.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.661972 kernel: pci 0000:00:15.0: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662028 kernel: pci 0000:00:15.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662084 kernel: pci 0000:00:15.1: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662149 kernel: pci 0000:00:15.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662198 kernel: pci 0000:00:15.2: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662276 kernel: pci 0000:00:15.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662338 kernel: pci 0000:00:15.3: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662405 kernel: pci 0000:00:15.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662479 kernel: pci 0000:00:15.4: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662546 kernel: pci 0000:00:15.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662616 kernel: pci 0000:00:15.5: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662681 kernel: pci 0000:00:15.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662744 kernel: pci 0000:00:15.6: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662814 kernel: pci 0000:00:15.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.662877 kernel: pci 0000:00:15.7: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.662950 kernel: pci 0000:00:16.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663020 kernel: pci 0000:00:16.0: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663112 kernel: pci 0000:00:16.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663198 kernel: pci 0000:00:16.1: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663268 kernel: pci 0000:00:16.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663337 kernel: pci 0000:00:16.2: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663415 kernel: pci 0000:00:16.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663488 kernel: pci 0000:00:16.3: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663568 kernel: pci 0000:00:16.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663623 kernel: pci 0000:00:16.4: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663680 kernel: pci 0000:00:16.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663727 kernel: pci 0000:00:16.5: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663794 kernel: pci 0000:00:16.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663849 kernel: pci 0000:00:16.6: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663900 kernel: pci 0000:00:16.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.663947 kernel: pci 0000:00:16.7: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.663997 kernel: pci 0000:00:17.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664045 kernel: pci 0000:00:17.0: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664097 kernel: pci 0000:00:17.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664144 kernel: pci 0000:00:17.1: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664201 kernel: pci 0000:00:17.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664249 kernel: pci 0000:00:17.2: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664300 kernel: pci 0000:00:17.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664352 kernel: pci 0000:00:17.3: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664408 kernel: pci 0000:00:17.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664457 kernel: pci 0000:00:17.4: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664507 kernel: pci 0000:00:17.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664571 kernel: pci 0000:00:17.5: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.664624 kernel: pci 0000:00:17.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.664671 kernel: pci 0000:00:17.6: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.668783 kernel: pci 0000:00:17.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.668855 kernel: pci 0000:00:17.7: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.668911 kernel: pci 0000:00:18.0: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.668959 kernel: pci 0000:00:18.0: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669011 kernel: pci 0000:00:18.1: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669071 kernel: pci 0000:00:18.1: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669130 kernel: pci 0000:00:18.2: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669193 kernel: pci 0000:00:18.2: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669244 kernel: pci 0000:00:18.3: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669290 kernel: pci 0000:00:18.3: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669342 kernel: pci 0000:00:18.4: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669389 kernel: pci 0000:00:18.4: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669439 kernel: pci 0000:00:18.5: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669487 kernel: pci 0000:00:18.5: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669536 kernel: pci 0000:00:18.6: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669606 kernel: pci 0000:00:18.6: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669658 kernel: pci 0000:00:18.7: [15ad:07a0] type 01 class 0x060400 Dec 13 14:34:32.669705 kernel: pci 0000:00:18.7: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.669754 kernel: pci_bus 0000:01: extended config space not accessible Dec 13 14:34:32.669805 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:34:32.669918 kernel: pci_bus 0000:02: extended config space not accessible Dec 13 14:34:32.669927 kernel: acpiphp: Slot [32] registered Dec 13 14:34:32.669933 kernel: acpiphp: Slot [33] registered Dec 13 14:34:32.669938 kernel: acpiphp: Slot [34] registered Dec 13 14:34:32.669944 kernel: acpiphp: Slot [35] registered Dec 13 14:34:32.669949 kernel: acpiphp: Slot [36] registered Dec 13 14:34:32.669954 kernel: acpiphp: Slot [37] registered Dec 13 14:34:32.669960 kernel: acpiphp: Slot [38] registered Dec 13 14:34:32.669967 kernel: acpiphp: Slot [39] registered Dec 13 14:34:32.669972 kernel: acpiphp: Slot [40] registered Dec 13 14:34:32.669978 kernel: acpiphp: Slot [41] registered Dec 13 14:34:32.669983 kernel: acpiphp: Slot [42] registered Dec 13 14:34:32.669989 kernel: acpiphp: Slot [43] registered Dec 13 14:34:32.669994 kernel: acpiphp: Slot [44] registered Dec 13 14:34:32.669999 kernel: acpiphp: Slot [45] registered Dec 13 14:34:32.670005 kernel: acpiphp: Slot [46] registered Dec 13 14:34:32.670010 kernel: acpiphp: Slot [47] registered Dec 13 14:34:32.670016 kernel: acpiphp: Slot [48] registered Dec 13 14:34:32.670021 kernel: acpiphp: Slot [49] registered Dec 13 14:34:32.670027 kernel: acpiphp: Slot [50] registered Dec 13 14:34:32.670032 kernel: acpiphp: Slot [51] registered Dec 13 14:34:32.670037 kernel: acpiphp: Slot [52] registered Dec 13 14:34:32.670042 kernel: acpiphp: Slot [53] registered Dec 13 14:34:32.670048 kernel: acpiphp: Slot [54] registered Dec 13 14:34:32.670053 kernel: acpiphp: Slot [55] registered Dec 13 14:34:32.670058 kernel: acpiphp: Slot [56] registered Dec 13 14:34:32.670065 kernel: acpiphp: Slot [57] registered Dec 13 14:34:32.670070 kernel: acpiphp: Slot [58] registered Dec 13 14:34:32.670076 kernel: acpiphp: Slot [59] registered Dec 13 14:34:32.670082 kernel: acpiphp: Slot [60] registered Dec 13 14:34:32.670090 kernel: acpiphp: Slot [61] registered Dec 13 14:34:32.670096 kernel: acpiphp: Slot [62] registered Dec 13 14:34:32.670102 kernel: acpiphp: Slot [63] registered Dec 13 14:34:32.670149 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] (subtractive decode) Dec 13 14:34:32.670204 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:34:32.670253 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:34:32.670307 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:34:32.670352 kernel: pci 0000:00:11.0: bridge window [mem 0x000a0000-0x000bffff window] (subtractive decode) Dec 13 14:34:32.670398 kernel: pci 0000:00:11.0: bridge window [mem 0x000cc000-0x000cffff window] (subtractive decode) Dec 13 14:34:32.670449 kernel: pci 0000:00:11.0: bridge window [mem 0x000d0000-0x000d3fff window] (subtractive decode) Dec 13 14:34:32.670494 kernel: pci 0000:00:11.0: bridge window [mem 0x000d4000-0x000d7fff window] (subtractive decode) Dec 13 14:34:32.670549 kernel: pci 0000:00:11.0: bridge window [mem 0x000d8000-0x000dbfff window] (subtractive decode) Dec 13 14:34:32.670603 kernel: pci 0000:00:11.0: bridge window [mem 0xc0000000-0xfebfffff window] (subtractive decode) Dec 13 14:34:32.670652 kernel: pci 0000:00:11.0: bridge window [io 0x0000-0x0cf7 window] (subtractive decode) Dec 13 14:34:32.670697 kernel: pci 0000:00:11.0: bridge window [io 0x0d00-0xfeff window] (subtractive decode) Dec 13 14:34:32.670748 kernel: pci 0000:03:00.0: [15ad:07c0] type 00 class 0x010700 Dec 13 14:34:32.670796 kernel: pci 0000:03:00.0: reg 0x10: [io 0x4000-0x4007] Dec 13 14:34:32.670847 kernel: pci 0000:03:00.0: reg 0x14: [mem 0xfd5f8000-0xfd5fffff 64bit] Dec 13 14:34:32.670894 kernel: pci 0000:03:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:34:32.670941 kernel: pci 0000:03:00.0: PME# supported from D0 D3hot D3cold Dec 13 14:34:32.670996 kernel: pci 0000:03:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:34:32.671044 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:34:32.671092 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:34:32.671145 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:34:32.671192 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:34:32.671238 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:34:32.671282 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:34:32.671329 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:34:32.671378 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:34:32.671423 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:34:32.671467 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:34:32.671512 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:34:32.673620 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:34:32.673689 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:34:32.673741 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:34:32.673803 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:34:32.673871 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:34:32.673931 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:34:32.673978 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:34:32.674024 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:34:32.674069 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:34:32.674124 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:34:32.674170 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:34:32.674215 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:34:32.674268 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:34:32.674317 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:34:32.674365 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:34:32.674417 kernel: pci 0000:0b:00.0: [15ad:07b0] type 00 class 0x020000 Dec 13 14:34:32.674466 kernel: pci 0000:0b:00.0: reg 0x10: [mem 0xfd4fc000-0xfd4fcfff] Dec 13 14:34:32.674513 kernel: pci 0000:0b:00.0: reg 0x14: [mem 0xfd4fd000-0xfd4fdfff] Dec 13 14:34:32.674566 kernel: pci 0000:0b:00.0: reg 0x18: [mem 0xfd4fe000-0xfd4fffff] Dec 13 14:34:32.674614 kernel: pci 0000:0b:00.0: reg 0x1c: [io 0x5000-0x500f] Dec 13 14:34:32.674671 kernel: pci 0000:0b:00.0: reg 0x30: [mem 0x00000000-0x0000ffff pref] Dec 13 14:34:32.674717 kernel: pci 0000:0b:00.0: supports D1 D2 Dec 13 14:34:32.674763 kernel: pci 0000:0b:00.0: PME# supported from D0 D1 D2 D3hot D3cold Dec 13 14:34:32.674822 kernel: pci 0000:0b:00.0: disabling ASPM on pre-1.1 PCIe device. You can enable it with 'pcie_aspm=force' Dec 13 14:34:32.676629 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:34:32.676683 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:34:32.676731 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:34:32.676784 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:34:32.676843 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:34:32.676889 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:34:32.676934 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:34:32.676983 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:34:32.677029 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:34:32.677073 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:34:32.677128 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:34:32.677180 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:34:32.677228 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:34:32.677278 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:34:32.677331 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:34:32.677376 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:34:32.677421 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:34:32.677467 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:34:32.677512 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:34:32.681455 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:34:32.681514 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:34:32.681595 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:34:32.681649 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:34:32.681705 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:34:32.681752 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:34:32.681797 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:34:32.681843 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:34:32.681888 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:34:32.681941 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:34:32.681987 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:34:32.682036 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:34:32.682100 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:34:32.682155 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:34:32.682199 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:34:32.682247 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:34:32.682297 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:34:32.682344 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:34:32.682390 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:34:32.682444 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:34:32.682489 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:34:32.682534 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:34:32.682594 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:34:32.682640 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:34:32.682686 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:34:32.682745 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:34:32.682791 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:34:32.682838 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:34:32.682885 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:34:32.682929 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:34:32.682974 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:34:32.683019 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:34:32.683064 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:34:32.683109 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:34:32.683160 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:34:32.683207 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:34:32.683252 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:34:32.683309 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:34:32.683356 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:34:32.683402 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:34:32.683446 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:34:32.683491 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:34:32.683539 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:34:32.683595 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:34:32.683643 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:34:32.683689 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:34:32.683734 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:34:32.683778 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:34:32.683844 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:34:32.683891 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:34:32.683938 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:34:32.683985 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:34:32.684039 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:34:32.684089 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:34:32.684136 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:34:32.684181 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:34:32.687594 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:34:32.687658 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:34:32.687710 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:34:32.687757 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:34:32.687765 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 9 Dec 13 14:34:32.687771 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 0 Dec 13 14:34:32.687776 kernel: ACPI: PCI: Interrupt link LNKB disabled Dec 13 14:34:32.687782 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Dec 13 14:34:32.687787 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 10 Dec 13 14:34:32.687793 kernel: iommu: Default domain type: Translated Dec 13 14:34:32.687798 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 14:34:32.687890 kernel: pci 0000:00:0f.0: vgaarb: setting as boot VGA device Dec 13 14:34:32.687936 kernel: pci 0000:00:0f.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Dec 13 14:34:32.687982 kernel: pci 0000:00:0f.0: vgaarb: bridge control possible Dec 13 14:34:32.687991 kernel: vgaarb: loaded Dec 13 14:34:32.687996 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:34:32.688002 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:34:32.688008 kernel: PTP clock support registered Dec 13 14:34:32.688013 kernel: PCI: Using ACPI for IRQ routing Dec 13 14:34:32.688019 kernel: PCI: pci_cache_line_size set to 64 bytes Dec 13 14:34:32.688027 kernel: e820: reserve RAM buffer [mem 0x0009ec00-0x0009ffff] Dec 13 14:34:32.688033 kernel: e820: reserve RAM buffer [mem 0x7fee0000-0x7fffffff] Dec 13 14:34:32.688038 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0 Dec 13 14:34:32.688044 kernel: hpet0: 16 comparators, 64-bit 14.318180 MHz counter Dec 13 14:34:32.688050 kernel: clocksource: Switched to clocksource tsc-early Dec 13 14:34:32.688055 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:34:32.688061 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:34:32.688067 kernel: pnp: PnP ACPI init Dec 13 14:34:32.688115 kernel: system 00:00: [io 0x1000-0x103f] has been reserved Dec 13 14:34:32.688161 kernel: system 00:00: [io 0x1040-0x104f] has been reserved Dec 13 14:34:32.688208 kernel: system 00:00: [io 0x0cf0-0x0cf1] has been reserved Dec 13 14:34:32.688253 kernel: system 00:04: [mem 0xfed00000-0xfed003ff] has been reserved Dec 13 14:34:32.688297 kernel: pnp 00:06: [dma 2] Dec 13 14:34:32.688341 kernel: system 00:07: [io 0xfce0-0xfcff] has been reserved Dec 13 14:34:32.688382 kernel: system 00:07: [mem 0xf0000000-0xf7ffffff] has been reserved Dec 13 14:34:32.688424 kernel: system 00:07: [mem 0xfe800000-0xfe9fffff] has been reserved Dec 13 14:34:32.688432 kernel: pnp: PnP ACPI: found 8 devices Dec 13 14:34:32.688438 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 14:34:32.688444 kernel: NET: Registered PF_INET protocol family Dec 13 14:34:32.688450 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:34:32.688455 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Dec 13 14:34:32.688461 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:34:32.688466 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 14:34:32.688474 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Dec 13 14:34:32.688479 kernel: TCP: Hash tables configured (established 16384 bind 16384) Dec 13 14:34:32.688485 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:34:32.688490 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Dec 13 14:34:32.688496 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:34:32.688501 kernel: NET: Registered PF_XDP protocol family Dec 13 14:34:32.688549 kernel: pci 0000:00:15.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 03] add_size 200000 add_align 100000 Dec 13 14:34:32.688634 kernel: pci 0000:00:15.3: bridge window [io 0x1000-0x0fff] to [bus 06] add_size 1000 Dec 13 14:34:32.688684 kernel: pci 0000:00:15.4: bridge window [io 0x1000-0x0fff] to [bus 07] add_size 1000 Dec 13 14:34:32.688731 kernel: pci 0000:00:15.5: bridge window [io 0x1000-0x0fff] to [bus 08] add_size 1000 Dec 13 14:34:32.688779 kernel: pci 0000:00:15.6: bridge window [io 0x1000-0x0fff] to [bus 09] add_size 1000 Dec 13 14:34:32.688826 kernel: pci 0000:00:15.7: bridge window [io 0x1000-0x0fff] to [bus 0a] add_size 1000 Dec 13 14:34:32.688873 kernel: pci 0000:00:16.0: bridge window [mem 0x00100000-0x000fffff 64bit pref] to [bus 0b] add_size 200000 add_align 100000 Dec 13 14:34:32.688920 kernel: pci 0000:00:16.3: bridge window [io 0x1000-0x0fff] to [bus 0e] add_size 1000 Dec 13 14:34:32.688968 kernel: pci 0000:00:16.4: bridge window [io 0x1000-0x0fff] to [bus 0f] add_size 1000 Dec 13 14:34:32.689014 kernel: pci 0000:00:16.5: bridge window [io 0x1000-0x0fff] to [bus 10] add_size 1000 Dec 13 14:34:32.689061 kernel: pci 0000:00:16.6: bridge window [io 0x1000-0x0fff] to [bus 11] add_size 1000 Dec 13 14:34:32.689107 kernel: pci 0000:00:16.7: bridge window [io 0x1000-0x0fff] to [bus 12] add_size 1000 Dec 13 14:34:32.689153 kernel: pci 0000:00:17.3: bridge window [io 0x1000-0x0fff] to [bus 16] add_size 1000 Dec 13 14:34:32.689199 kernel: pci 0000:00:17.4: bridge window [io 0x1000-0x0fff] to [bus 17] add_size 1000 Dec 13 14:34:32.689248 kernel: pci 0000:00:17.5: bridge window [io 0x1000-0x0fff] to [bus 18] add_size 1000 Dec 13 14:34:32.689294 kernel: pci 0000:00:17.6: bridge window [io 0x1000-0x0fff] to [bus 19] add_size 1000 Dec 13 14:34:32.689339 kernel: pci 0000:00:17.7: bridge window [io 0x1000-0x0fff] to [bus 1a] add_size 1000 Dec 13 14:34:32.689385 kernel: pci 0000:00:18.2: bridge window [io 0x1000-0x0fff] to [bus 1d] add_size 1000 Dec 13 14:34:32.689430 kernel: pci 0000:00:18.3: bridge window [io 0x1000-0x0fff] to [bus 1e] add_size 1000 Dec 13 14:34:32.689476 kernel: pci 0000:00:18.4: bridge window [io 0x1000-0x0fff] to [bus 1f] add_size 1000 Dec 13 14:34:32.689525 kernel: pci 0000:00:18.5: bridge window [io 0x1000-0x0fff] to [bus 20] add_size 1000 Dec 13 14:34:32.689578 kernel: pci 0000:00:18.6: bridge window [io 0x1000-0x0fff] to [bus 21] add_size 1000 Dec 13 14:34:32.689624 kernel: pci 0000:00:18.7: bridge window [io 0x1000-0x0fff] to [bus 22] add_size 1000 Dec 13 14:34:32.689669 kernel: pci 0000:00:15.0: BAR 15: assigned [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:34:32.689713 kernel: pci 0000:00:16.0: BAR 15: assigned [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:34:32.689759 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.689806 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.689891 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.689935 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.689980 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690025 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690069 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690113 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690157 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690205 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690269 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690315 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690359 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690405 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690450 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690510 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690555 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690617 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690663 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690708 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.690752 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.690797 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692001 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692060 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692110 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692161 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692207 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692253 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692320 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692413 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692462 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692507 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692554 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.692903 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.692953 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693000 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693054 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693103 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693149 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693195 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693240 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693287 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693332 kernel: pci 0000:00:18.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693376 kernel: pci 0000:00:18.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693421 kernel: pci 0000:00:18.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693466 kernel: pci 0000:00:18.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693511 kernel: pci 0000:00:18.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693562 kernel: pci 0000:00:18.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693609 kernel: pci 0000:00:18.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693654 kernel: pci 0000:00:18.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.693926 kernel: pci 0000:00:18.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.693990 kernel: pci 0000:00:18.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694042 kernel: pci 0000:00:18.2: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694089 kernel: pci 0000:00:18.2: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694136 kernel: pci 0000:00:17.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694181 kernel: pci 0000:00:17.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694228 kernel: pci 0000:00:17.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694273 kernel: pci 0000:00:17.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694319 kernel: pci 0000:00:17.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694363 kernel: pci 0000:00:17.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694410 kernel: pci 0000:00:17.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694456 kernel: pci 0000:00:17.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694501 kernel: pci 0000:00:17.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694547 kernel: pci 0000:00:17.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694894 kernel: pci 0000:00:16.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.694947 kernel: pci 0000:00:16.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.694995 kernel: pci 0000:00:16.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695041 kernel: pci 0000:00:16.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695087 kernel: pci 0000:00:16.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695133 kernel: pci 0000:00:16.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695181 kernel: pci 0000:00:16.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695225 kernel: pci 0000:00:16.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695271 kernel: pci 0000:00:16.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695315 kernel: pci 0000:00:16.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695361 kernel: pci 0000:00:15.7: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695406 kernel: pci 0000:00:15.7: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695452 kernel: pci 0000:00:15.6: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695496 kernel: pci 0000:00:15.6: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695541 kernel: pci 0000:00:15.5: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695596 kernel: pci 0000:00:15.5: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.695641 kernel: pci 0000:00:15.4: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.695686 kernel: pci 0000:00:15.4: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.696008 kernel: pci 0000:00:15.3: BAR 13: no space for [io size 0x1000] Dec 13 14:34:32.696065 kernel: pci 0000:00:15.3: BAR 13: failed to assign [io size 0x1000] Dec 13 14:34:32.696115 kernel: pci 0000:00:01.0: PCI bridge to [bus 01] Dec 13 14:34:32.696164 kernel: pci 0000:00:11.0: PCI bridge to [bus 02] Dec 13 14:34:32.696327 kernel: pci 0000:00:11.0: bridge window [io 0x2000-0x3fff] Dec 13 14:34:32.696379 kernel: pci 0000:00:11.0: bridge window [mem 0xfd600000-0xfdffffff] Dec 13 14:34:32.696426 kernel: pci 0000:00:11.0: bridge window [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:34:32.696476 kernel: pci 0000:03:00.0: BAR 6: assigned [mem 0xfd500000-0xfd50ffff pref] Dec 13 14:34:32.696535 kernel: pci 0000:00:15.0: PCI bridge to [bus 03] Dec 13 14:34:32.696595 kernel: pci 0000:00:15.0: bridge window [io 0x4000-0x4fff] Dec 13 14:34:32.696642 kernel: pci 0000:00:15.0: bridge window [mem 0xfd500000-0xfd5fffff] Dec 13 14:34:32.696688 kernel: pci 0000:00:15.0: bridge window [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:34:32.696735 kernel: pci 0000:00:15.1: PCI bridge to [bus 04] Dec 13 14:34:32.696781 kernel: pci 0000:00:15.1: bridge window [io 0x8000-0x8fff] Dec 13 14:34:32.696833 kernel: pci 0000:00:15.1: bridge window [mem 0xfd100000-0xfd1fffff] Dec 13 14:34:32.696878 kernel: pci 0000:00:15.1: bridge window [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:34:32.696926 kernel: pci 0000:00:15.2: PCI bridge to [bus 05] Dec 13 14:34:32.696971 kernel: pci 0000:00:15.2: bridge window [io 0xc000-0xcfff] Dec 13 14:34:32.697017 kernel: pci 0000:00:15.2: bridge window [mem 0xfcd00000-0xfcdfffff] Dec 13 14:34:32.697061 kernel: pci 0000:00:15.2: bridge window [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:34:32.697107 kernel: pci 0000:00:15.3: PCI bridge to [bus 06] Dec 13 14:34:32.697152 kernel: pci 0000:00:15.3: bridge window [mem 0xfc900000-0xfc9fffff] Dec 13 14:34:32.697197 kernel: pci 0000:00:15.3: bridge window [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:34:32.697245 kernel: pci 0000:00:15.4: PCI bridge to [bus 07] Dec 13 14:34:32.697290 kernel: pci 0000:00:15.4: bridge window [mem 0xfc500000-0xfc5fffff] Dec 13 14:34:32.697335 kernel: pci 0000:00:15.4: bridge window [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:34:32.697379 kernel: pci 0000:00:15.5: PCI bridge to [bus 08] Dec 13 14:34:32.697425 kernel: pci 0000:00:15.5: bridge window [mem 0xfc100000-0xfc1fffff] Dec 13 14:34:32.697470 kernel: pci 0000:00:15.5: bridge window [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:34:32.697515 kernel: pci 0000:00:15.6: PCI bridge to [bus 09] Dec 13 14:34:32.697574 kernel: pci 0000:00:15.6: bridge window [mem 0xfbd00000-0xfbdfffff] Dec 13 14:34:32.697624 kernel: pci 0000:00:15.6: bridge window [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:34:32.697669 kernel: pci 0000:00:15.7: PCI bridge to [bus 0a] Dec 13 14:34:32.697713 kernel: pci 0000:00:15.7: bridge window [mem 0xfb900000-0xfb9fffff] Dec 13 14:34:32.697759 kernel: pci 0000:00:15.7: bridge window [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:34:32.697808 kernel: pci 0000:0b:00.0: BAR 6: assigned [mem 0xfd400000-0xfd40ffff pref] Dec 13 14:34:32.697895 kernel: pci 0000:00:16.0: PCI bridge to [bus 0b] Dec 13 14:34:32.697941 kernel: pci 0000:00:16.0: bridge window [io 0x5000-0x5fff] Dec 13 14:34:32.697986 kernel: pci 0000:00:16.0: bridge window [mem 0xfd400000-0xfd4fffff] Dec 13 14:34:32.698035 kernel: pci 0000:00:16.0: bridge window [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:34:32.698081 kernel: pci 0000:00:16.1: PCI bridge to [bus 0c] Dec 13 14:34:32.698128 kernel: pci 0000:00:16.1: bridge window [io 0x9000-0x9fff] Dec 13 14:34:32.698173 kernel: pci 0000:00:16.1: bridge window [mem 0xfd000000-0xfd0fffff] Dec 13 14:34:32.698219 kernel: pci 0000:00:16.1: bridge window [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:34:32.698265 kernel: pci 0000:00:16.2: PCI bridge to [bus 0d] Dec 13 14:34:32.698309 kernel: pci 0000:00:16.2: bridge window [io 0xd000-0xdfff] Dec 13 14:34:32.698354 kernel: pci 0000:00:16.2: bridge window [mem 0xfcc00000-0xfccfffff] Dec 13 14:34:32.698401 kernel: pci 0000:00:16.2: bridge window [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:34:32.698448 kernel: pci 0000:00:16.3: PCI bridge to [bus 0e] Dec 13 14:34:32.698491 kernel: pci 0000:00:16.3: bridge window [mem 0xfc800000-0xfc8fffff] Dec 13 14:34:32.698537 kernel: pci 0000:00:16.3: bridge window [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:34:32.698752 kernel: pci 0000:00:16.4: PCI bridge to [bus 0f] Dec 13 14:34:32.698803 kernel: pci 0000:00:16.4: bridge window [mem 0xfc400000-0xfc4fffff] Dec 13 14:34:32.698850 kernel: pci 0000:00:16.4: bridge window [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:34:32.698897 kernel: pci 0000:00:16.5: PCI bridge to [bus 10] Dec 13 14:34:32.698942 kernel: pci 0000:00:16.5: bridge window [mem 0xfc000000-0xfc0fffff] Dec 13 14:34:32.699262 kernel: pci 0000:00:16.5: bridge window [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:34:32.699316 kernel: pci 0000:00:16.6: PCI bridge to [bus 11] Dec 13 14:34:32.699367 kernel: pci 0000:00:16.6: bridge window [mem 0xfbc00000-0xfbcfffff] Dec 13 14:34:32.699414 kernel: pci 0000:00:16.6: bridge window [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:34:32.699814 kernel: pci 0000:00:16.7: PCI bridge to [bus 12] Dec 13 14:34:32.699925 kernel: pci 0000:00:16.7: bridge window [mem 0xfb800000-0xfb8fffff] Dec 13 14:34:32.699990 kernel: pci 0000:00:16.7: bridge window [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:34:32.700334 kernel: pci 0000:00:17.0: PCI bridge to [bus 13] Dec 13 14:34:32.700385 kernel: pci 0000:00:17.0: bridge window [io 0x6000-0x6fff] Dec 13 14:34:32.700432 kernel: pci 0000:00:17.0: bridge window [mem 0xfd300000-0xfd3fffff] Dec 13 14:34:32.700478 kernel: pci 0000:00:17.0: bridge window [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:34:32.700526 kernel: pci 0000:00:17.1: PCI bridge to [bus 14] Dec 13 14:34:32.700604 kernel: pci 0000:00:17.1: bridge window [io 0xa000-0xafff] Dec 13 14:34:32.700651 kernel: pci 0000:00:17.1: bridge window [mem 0xfcf00000-0xfcffffff] Dec 13 14:34:32.700696 kernel: pci 0000:00:17.1: bridge window [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:34:32.700741 kernel: pci 0000:00:17.2: PCI bridge to [bus 15] Dec 13 14:34:32.700786 kernel: pci 0000:00:17.2: bridge window [io 0xe000-0xefff] Dec 13 14:34:32.701115 kernel: pci 0000:00:17.2: bridge window [mem 0xfcb00000-0xfcbfffff] Dec 13 14:34:32.701166 kernel: pci 0000:00:17.2: bridge window [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:34:32.701214 kernel: pci 0000:00:17.3: PCI bridge to [bus 16] Dec 13 14:34:32.701399 kernel: pci 0000:00:17.3: bridge window [mem 0xfc700000-0xfc7fffff] Dec 13 14:34:32.701476 kernel: pci 0000:00:17.3: bridge window [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:34:32.701525 kernel: pci 0000:00:17.4: PCI bridge to [bus 17] Dec 13 14:34:32.701596 kernel: pci 0000:00:17.4: bridge window [mem 0xfc300000-0xfc3fffff] Dec 13 14:34:32.701913 kernel: pci 0000:00:17.4: bridge window [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:34:32.701965 kernel: pci 0000:00:17.5: PCI bridge to [bus 18] Dec 13 14:34:32.702041 kernel: pci 0000:00:17.5: bridge window [mem 0xfbf00000-0xfbffffff] Dec 13 14:34:32.702090 kernel: pci 0000:00:17.5: bridge window [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:34:32.702136 kernel: pci 0000:00:17.6: PCI bridge to [bus 19] Dec 13 14:34:32.702180 kernel: pci 0000:00:17.6: bridge window [mem 0xfbb00000-0xfbbfffff] Dec 13 14:34:32.702227 kernel: pci 0000:00:17.6: bridge window [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:34:32.702605 kernel: pci 0000:00:17.7: PCI bridge to [bus 1a] Dec 13 14:34:32.702656 kernel: pci 0000:00:17.7: bridge window [mem 0xfb700000-0xfb7fffff] Dec 13 14:34:32.702703 kernel: pci 0000:00:17.7: bridge window [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:34:32.702749 kernel: pci 0000:00:18.0: PCI bridge to [bus 1b] Dec 13 14:34:32.703089 kernel: pci 0000:00:18.0: bridge window [io 0x7000-0x7fff] Dec 13 14:34:32.703138 kernel: pci 0000:00:18.0: bridge window [mem 0xfd200000-0xfd2fffff] Dec 13 14:34:32.703185 kernel: pci 0000:00:18.0: bridge window [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:34:32.703231 kernel: pci 0000:00:18.1: PCI bridge to [bus 1c] Dec 13 14:34:32.703277 kernel: pci 0000:00:18.1: bridge window [io 0xb000-0xbfff] Dec 13 14:34:32.703324 kernel: pci 0000:00:18.1: bridge window [mem 0xfce00000-0xfcefffff] Dec 13 14:34:32.703369 kernel: pci 0000:00:18.1: bridge window [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:34:32.703414 kernel: pci 0000:00:18.2: PCI bridge to [bus 1d] Dec 13 14:34:32.703460 kernel: pci 0000:00:18.2: bridge window [mem 0xfca00000-0xfcafffff] Dec 13 14:34:32.703505 kernel: pci 0000:00:18.2: bridge window [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:34:32.703550 kernel: pci 0000:00:18.3: PCI bridge to [bus 1e] Dec 13 14:34:32.703629 kernel: pci 0000:00:18.3: bridge window [mem 0xfc600000-0xfc6fffff] Dec 13 14:34:32.703675 kernel: pci 0000:00:18.3: bridge window [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:34:32.703720 kernel: pci 0000:00:18.4: PCI bridge to [bus 1f] Dec 13 14:34:32.704035 kernel: pci 0000:00:18.4: bridge window [mem 0xfc200000-0xfc2fffff] Dec 13 14:34:32.704093 kernel: pci 0000:00:18.4: bridge window [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:34:32.704142 kernel: pci 0000:00:18.5: PCI bridge to [bus 20] Dec 13 14:34:32.704189 kernel: pci 0000:00:18.5: bridge window [mem 0xfbe00000-0xfbefffff] Dec 13 14:34:32.704235 kernel: pci 0000:00:18.5: bridge window [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:34:32.704281 kernel: pci 0000:00:18.6: PCI bridge to [bus 21] Dec 13 14:34:32.704326 kernel: pci 0000:00:18.6: bridge window [mem 0xfba00000-0xfbafffff] Dec 13 14:34:32.704371 kernel: pci 0000:00:18.6: bridge window [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:34:32.704415 kernel: pci 0000:00:18.7: PCI bridge to [bus 22] Dec 13 14:34:32.704460 kernel: pci 0000:00:18.7: bridge window [mem 0xfb600000-0xfb6fffff] Dec 13 14:34:32.704508 kernel: pci 0000:00:18.7: bridge window [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:34:32.704553 kernel: pci_bus 0000:00: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:34:32.704620 kernel: pci_bus 0000:00: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:34:32.704660 kernel: pci_bus 0000:00: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:34:32.704700 kernel: pci_bus 0000:00: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:34:32.704739 kernel: pci_bus 0000:00: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:34:32.704951 kernel: pci_bus 0000:00: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:34:32.705000 kernel: pci_bus 0000:00: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:34:32.705041 kernel: pci_bus 0000:00: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:34:32.705085 kernel: pci_bus 0000:02: resource 0 [io 0x2000-0x3fff] Dec 13 14:34:32.705395 kernel: pci_bus 0000:02: resource 1 [mem 0xfd600000-0xfdffffff] Dec 13 14:34:32.705461 kernel: pci_bus 0000:02: resource 2 [mem 0xe7b00000-0xe7ffffff 64bit pref] Dec 13 14:34:32.705520 kernel: pci_bus 0000:02: resource 4 [mem 0x000a0000-0x000bffff window] Dec 13 14:34:32.705594 kernel: pci_bus 0000:02: resource 5 [mem 0x000cc000-0x000cffff window] Dec 13 14:34:32.705645 kernel: pci_bus 0000:02: resource 6 [mem 0x000d0000-0x000d3fff window] Dec 13 14:34:32.705686 kernel: pci_bus 0000:02: resource 7 [mem 0x000d4000-0x000d7fff window] Dec 13 14:34:32.705747 kernel: pci_bus 0000:02: resource 8 [mem 0x000d8000-0x000dbfff window] Dec 13 14:34:32.705793 kernel: pci_bus 0000:02: resource 9 [mem 0xc0000000-0xfebfffff window] Dec 13 14:34:32.705927 kernel: pci_bus 0000:02: resource 10 [io 0x0000-0x0cf7 window] Dec 13 14:34:32.705971 kernel: pci_bus 0000:02: resource 11 [io 0x0d00-0xfeff window] Dec 13 14:34:32.706019 kernel: pci_bus 0000:03: resource 0 [io 0x4000-0x4fff] Dec 13 14:34:32.706328 kernel: pci_bus 0000:03: resource 1 [mem 0xfd500000-0xfd5fffff] Dec 13 14:34:32.706380 kernel: pci_bus 0000:03: resource 2 [mem 0xc0000000-0xc01fffff 64bit pref] Dec 13 14:34:32.706427 kernel: pci_bus 0000:04: resource 0 [io 0x8000-0x8fff] Dec 13 14:34:32.706471 kernel: pci_bus 0000:04: resource 1 [mem 0xfd100000-0xfd1fffff] Dec 13 14:34:32.706513 kernel: pci_bus 0000:04: resource 2 [mem 0xe7800000-0xe78fffff 64bit pref] Dec 13 14:34:32.706565 kernel: pci_bus 0000:05: resource 0 [io 0xc000-0xcfff] Dec 13 14:34:32.706615 kernel: pci_bus 0000:05: resource 1 [mem 0xfcd00000-0xfcdfffff] Dec 13 14:34:32.706660 kernel: pci_bus 0000:05: resource 2 [mem 0xe7400000-0xe74fffff 64bit pref] Dec 13 14:34:32.706706 kernel: pci_bus 0000:06: resource 1 [mem 0xfc900000-0xfc9fffff] Dec 13 14:34:32.706748 kernel: pci_bus 0000:06: resource 2 [mem 0xe7000000-0xe70fffff 64bit pref] Dec 13 14:34:32.706796 kernel: pci_bus 0000:07: resource 1 [mem 0xfc500000-0xfc5fffff] Dec 13 14:34:32.706850 kernel: pci_bus 0000:07: resource 2 [mem 0xe6c00000-0xe6cfffff 64bit pref] Dec 13 14:34:32.706898 kernel: pci_bus 0000:08: resource 1 [mem 0xfc100000-0xfc1fffff] Dec 13 14:34:32.706943 kernel: pci_bus 0000:08: resource 2 [mem 0xe6800000-0xe68fffff 64bit pref] Dec 13 14:34:32.706988 kernel: pci_bus 0000:09: resource 1 [mem 0xfbd00000-0xfbdfffff] Dec 13 14:34:32.707030 kernel: pci_bus 0000:09: resource 2 [mem 0xe6400000-0xe64fffff 64bit pref] Dec 13 14:34:32.707078 kernel: pci_bus 0000:0a: resource 1 [mem 0xfb900000-0xfb9fffff] Dec 13 14:34:32.707121 kernel: pci_bus 0000:0a: resource 2 [mem 0xe6000000-0xe60fffff 64bit pref] Dec 13 14:34:32.707166 kernel: pci_bus 0000:0b: resource 0 [io 0x5000-0x5fff] Dec 13 14:34:32.707211 kernel: pci_bus 0000:0b: resource 1 [mem 0xfd400000-0xfd4fffff] Dec 13 14:34:32.707253 kernel: pci_bus 0000:0b: resource 2 [mem 0xc0200000-0xc03fffff 64bit pref] Dec 13 14:34:32.707298 kernel: pci_bus 0000:0c: resource 0 [io 0x9000-0x9fff] Dec 13 14:34:32.707340 kernel: pci_bus 0000:0c: resource 1 [mem 0xfd000000-0xfd0fffff] Dec 13 14:34:32.707382 kernel: pci_bus 0000:0c: resource 2 [mem 0xe7700000-0xe77fffff 64bit pref] Dec 13 14:34:32.707427 kernel: pci_bus 0000:0d: resource 0 [io 0xd000-0xdfff] Dec 13 14:34:32.707469 kernel: pci_bus 0000:0d: resource 1 [mem 0xfcc00000-0xfccfffff] Dec 13 14:34:32.707513 kernel: pci_bus 0000:0d: resource 2 [mem 0xe7300000-0xe73fffff 64bit pref] Dec 13 14:34:32.707590 kernel: pci_bus 0000:0e: resource 1 [mem 0xfc800000-0xfc8fffff] Dec 13 14:34:32.707639 kernel: pci_bus 0000:0e: resource 2 [mem 0xe6f00000-0xe6ffffff 64bit pref] Dec 13 14:34:32.707686 kernel: pci_bus 0000:0f: resource 1 [mem 0xfc400000-0xfc4fffff] Dec 13 14:34:32.707746 kernel: pci_bus 0000:0f: resource 2 [mem 0xe6b00000-0xe6bfffff 64bit pref] Dec 13 14:34:32.707801 kernel: pci_bus 0000:10: resource 1 [mem 0xfc000000-0xfc0fffff] Dec 13 14:34:32.707981 kernel: pci_bus 0000:10: resource 2 [mem 0xe6700000-0xe67fffff 64bit pref] Dec 13 14:34:32.708034 kernel: pci_bus 0000:11: resource 1 [mem 0xfbc00000-0xfbcfffff] Dec 13 14:34:32.708078 kernel: pci_bus 0000:11: resource 2 [mem 0xe6300000-0xe63fffff 64bit pref] Dec 13 14:34:32.708398 kernel: pci_bus 0000:12: resource 1 [mem 0xfb800000-0xfb8fffff] Dec 13 14:34:32.708448 kernel: pci_bus 0000:12: resource 2 [mem 0xe5f00000-0xe5ffffff 64bit pref] Dec 13 14:34:32.708497 kernel: pci_bus 0000:13: resource 0 [io 0x6000-0x6fff] Dec 13 14:34:32.708541 kernel: pci_bus 0000:13: resource 1 [mem 0xfd300000-0xfd3fffff] Dec 13 14:34:32.708617 kernel: pci_bus 0000:13: resource 2 [mem 0xe7a00000-0xe7afffff 64bit pref] Dec 13 14:34:32.708664 kernel: pci_bus 0000:14: resource 0 [io 0xa000-0xafff] Dec 13 14:34:32.708706 kernel: pci_bus 0000:14: resource 1 [mem 0xfcf00000-0xfcffffff] Dec 13 14:34:32.708748 kernel: pci_bus 0000:14: resource 2 [mem 0xe7600000-0xe76fffff 64bit pref] Dec 13 14:34:32.708920 kernel: pci_bus 0000:15: resource 0 [io 0xe000-0xefff] Dec 13 14:34:32.708967 kernel: pci_bus 0000:15: resource 1 [mem 0xfcb00000-0xfcbfffff] Dec 13 14:34:32.709009 kernel: pci_bus 0000:15: resource 2 [mem 0xe7200000-0xe72fffff 64bit pref] Dec 13 14:34:32.709060 kernel: pci_bus 0000:16: resource 1 [mem 0xfc700000-0xfc7fffff] Dec 13 14:34:32.709373 kernel: pci_bus 0000:16: resource 2 [mem 0xe6e00000-0xe6efffff 64bit pref] Dec 13 14:34:32.709423 kernel: pci_bus 0000:17: resource 1 [mem 0xfc300000-0xfc3fffff] Dec 13 14:34:32.709467 kernel: pci_bus 0000:17: resource 2 [mem 0xe6a00000-0xe6afffff 64bit pref] Dec 13 14:34:32.709514 kernel: pci_bus 0000:18: resource 1 [mem 0xfbf00000-0xfbffffff] Dec 13 14:34:32.709590 kernel: pci_bus 0000:18: resource 2 [mem 0xe6600000-0xe66fffff 64bit pref] Dec 13 14:34:32.709642 kernel: pci_bus 0000:19: resource 1 [mem 0xfbb00000-0xfbbfffff] Dec 13 14:34:32.709685 kernel: pci_bus 0000:19: resource 2 [mem 0xe6200000-0xe62fffff 64bit pref] Dec 13 14:34:32.709730 kernel: pci_bus 0000:1a: resource 1 [mem 0xfb700000-0xfb7fffff] Dec 13 14:34:32.709925 kernel: pci_bus 0000:1a: resource 2 [mem 0xe5e00000-0xe5efffff 64bit pref] Dec 13 14:34:32.709979 kernel: pci_bus 0000:1b: resource 0 [io 0x7000-0x7fff] Dec 13 14:34:32.710026 kernel: pci_bus 0000:1b: resource 1 [mem 0xfd200000-0xfd2fffff] Dec 13 14:34:32.710070 kernel: pci_bus 0000:1b: resource 2 [mem 0xe7900000-0xe79fffff 64bit pref] Dec 13 14:34:32.710386 kernel: pci_bus 0000:1c: resource 0 [io 0xb000-0xbfff] Dec 13 14:34:32.710434 kernel: pci_bus 0000:1c: resource 1 [mem 0xfce00000-0xfcefffff] Dec 13 14:34:32.710476 kernel: pci_bus 0000:1c: resource 2 [mem 0xe7500000-0xe75fffff 64bit pref] Dec 13 14:34:32.710522 kernel: pci_bus 0000:1d: resource 1 [mem 0xfca00000-0xfcafffff] Dec 13 14:34:32.710572 kernel: pci_bus 0000:1d: resource 2 [mem 0xe7100000-0xe71fffff 64bit pref] Dec 13 14:34:32.710620 kernel: pci_bus 0000:1e: resource 1 [mem 0xfc600000-0xfc6fffff] Dec 13 14:34:32.710663 kernel: pci_bus 0000:1e: resource 2 [mem 0xe6d00000-0xe6dfffff 64bit pref] Dec 13 14:34:32.710708 kernel: pci_bus 0000:1f: resource 1 [mem 0xfc200000-0xfc2fffff] Dec 13 14:34:32.710751 kernel: pci_bus 0000:1f: resource 2 [mem 0xe6900000-0xe69fffff 64bit pref] Dec 13 14:34:32.711007 kernel: pci_bus 0000:20: resource 1 [mem 0xfbe00000-0xfbefffff] Dec 13 14:34:32.711055 kernel: pci_bus 0000:20: resource 2 [mem 0xe6500000-0xe65fffff 64bit pref] Dec 13 14:34:32.711105 kernel: pci_bus 0000:21: resource 1 [mem 0xfba00000-0xfbafffff] Dec 13 14:34:32.711160 kernel: pci_bus 0000:21: resource 2 [mem 0xe6100000-0xe61fffff 64bit pref] Dec 13 14:34:32.711409 kernel: pci_bus 0000:22: resource 1 [mem 0xfb600000-0xfb6fffff] Dec 13 14:34:32.711460 kernel: pci_bus 0000:22: resource 2 [mem 0xe5d00000-0xe5dfffff 64bit pref] Dec 13 14:34:32.711513 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Dec 13 14:34:32.711523 kernel: PCI: CLS 32 bytes, default 64 Dec 13 14:34:32.711529 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 14:34:32.711537 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x311fd3cd494, max_idle_ns: 440795223879 ns Dec 13 14:34:32.711544 kernel: clocksource: Switched to clocksource tsc Dec 13 14:34:32.711550 kernel: Initialise system trusted keyrings Dec 13 14:34:32.711562 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Dec 13 14:34:32.711571 kernel: Key type asymmetric registered Dec 13 14:34:32.711591 kernel: Asymmetric key parser 'x509' registered Dec 13 14:34:32.711599 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:34:32.711605 kernel: io scheduler mq-deadline registered Dec 13 14:34:32.711611 kernel: io scheduler kyber registered Dec 13 14:34:32.711619 kernel: io scheduler bfq registered Dec 13 14:34:32.712479 kernel: pcieport 0000:00:15.0: PME: Signaling with IRQ 24 Dec 13 14:34:32.712553 kernel: pcieport 0000:00:15.0: pciehp: Slot #160 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.712654 kernel: pcieport 0000:00:15.1: PME: Signaling with IRQ 25 Dec 13 14:34:32.712993 kernel: pcieport 0000:00:15.1: pciehp: Slot #161 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713047 kernel: pcieport 0000:00:15.2: PME: Signaling with IRQ 26 Dec 13 14:34:32.713096 kernel: pcieport 0000:00:15.2: pciehp: Slot #162 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713145 kernel: pcieport 0000:00:15.3: PME: Signaling with IRQ 27 Dec 13 14:34:32.713196 kernel: pcieport 0000:00:15.3: pciehp: Slot #163 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713242 kernel: pcieport 0000:00:15.4: PME: Signaling with IRQ 28 Dec 13 14:34:32.713289 kernel: pcieport 0000:00:15.4: pciehp: Slot #164 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713334 kernel: pcieport 0000:00:15.5: PME: Signaling with IRQ 29 Dec 13 14:34:32.713381 kernel: pcieport 0000:00:15.5: pciehp: Slot #165 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713449 kernel: pcieport 0000:00:15.6: PME: Signaling with IRQ 30 Dec 13 14:34:32.713497 kernel: pcieport 0000:00:15.6: pciehp: Slot #166 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713545 kernel: pcieport 0000:00:15.7: PME: Signaling with IRQ 31 Dec 13 14:34:32.713600 kernel: pcieport 0000:00:15.7: pciehp: Slot #167 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713647 kernel: pcieport 0000:00:16.0: PME: Signaling with IRQ 32 Dec 13 14:34:32.713711 kernel: pcieport 0000:00:16.0: pciehp: Slot #192 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713759 kernel: pcieport 0000:00:16.1: PME: Signaling with IRQ 33 Dec 13 14:34:32.713804 kernel: pcieport 0000:00:16.1: pciehp: Slot #193 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713854 kernel: pcieport 0000:00:16.2: PME: Signaling with IRQ 34 Dec 13 14:34:32.713900 kernel: pcieport 0000:00:16.2: pciehp: Slot #194 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.713945 kernel: pcieport 0000:00:16.3: PME: Signaling with IRQ 35 Dec 13 14:34:32.713991 kernel: pcieport 0000:00:16.3: pciehp: Slot #195 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714038 kernel: pcieport 0000:00:16.4: PME: Signaling with IRQ 36 Dec 13 14:34:32.714086 kernel: pcieport 0000:00:16.4: pciehp: Slot #196 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714132 kernel: pcieport 0000:00:16.5: PME: Signaling with IRQ 37 Dec 13 14:34:32.714179 kernel: pcieport 0000:00:16.5: pciehp: Slot #197 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714225 kernel: pcieport 0000:00:16.6: PME: Signaling with IRQ 38 Dec 13 14:34:32.714271 kernel: pcieport 0000:00:16.6: pciehp: Slot #198 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714317 kernel: pcieport 0000:00:16.7: PME: Signaling with IRQ 39 Dec 13 14:34:32.714363 kernel: pcieport 0000:00:16.7: pciehp: Slot #199 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714409 kernel: pcieport 0000:00:17.0: PME: Signaling with IRQ 40 Dec 13 14:34:32.714454 kernel: pcieport 0000:00:17.0: pciehp: Slot #224 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714500 kernel: pcieport 0000:00:17.1: PME: Signaling with IRQ 41 Dec 13 14:34:32.714545 kernel: pcieport 0000:00:17.1: pciehp: Slot #225 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714606 kernel: pcieport 0000:00:17.2: PME: Signaling with IRQ 42 Dec 13 14:34:32.714653 kernel: pcieport 0000:00:17.2: pciehp: Slot #226 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714699 kernel: pcieport 0000:00:17.3: PME: Signaling with IRQ 43 Dec 13 14:34:32.714745 kernel: pcieport 0000:00:17.3: pciehp: Slot #227 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714791 kernel: pcieport 0000:00:17.4: PME: Signaling with IRQ 44 Dec 13 14:34:32.714836 kernel: pcieport 0000:00:17.4: pciehp: Slot #228 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714885 kernel: pcieport 0000:00:17.5: PME: Signaling with IRQ 45 Dec 13 14:34:32.714931 kernel: pcieport 0000:00:17.5: pciehp: Slot #229 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.714976 kernel: pcieport 0000:00:17.6: PME: Signaling with IRQ 46 Dec 13 14:34:32.715022 kernel: pcieport 0000:00:17.6: pciehp: Slot #230 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715068 kernel: pcieport 0000:00:17.7: PME: Signaling with IRQ 47 Dec 13 14:34:32.715116 kernel: pcieport 0000:00:17.7: pciehp: Slot #231 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715161 kernel: pcieport 0000:00:18.0: PME: Signaling with IRQ 48 Dec 13 14:34:32.715207 kernel: pcieport 0000:00:18.0: pciehp: Slot #256 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715252 kernel: pcieport 0000:00:18.1: PME: Signaling with IRQ 49 Dec 13 14:34:32.715299 kernel: pcieport 0000:00:18.1: pciehp: Slot #257 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715344 kernel: pcieport 0000:00:18.2: PME: Signaling with IRQ 50 Dec 13 14:34:32.715390 kernel: pcieport 0000:00:18.2: pciehp: Slot #258 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715438 kernel: pcieport 0000:00:18.3: PME: Signaling with IRQ 51 Dec 13 14:34:32.715484 kernel: pcieport 0000:00:18.3: pciehp: Slot #259 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715530 kernel: pcieport 0000:00:18.4: PME: Signaling with IRQ 52 Dec 13 14:34:32.715582 kernel: pcieport 0000:00:18.4: pciehp: Slot #260 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715628 kernel: pcieport 0000:00:18.5: PME: Signaling with IRQ 53 Dec 13 14:34:32.715676 kernel: pcieport 0000:00:18.5: pciehp: Slot #261 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715722 kernel: pcieport 0000:00:18.6: PME: Signaling with IRQ 54 Dec 13 14:34:32.715768 kernel: pcieport 0000:00:18.6: pciehp: Slot #262 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715813 kernel: pcieport 0000:00:18.7: PME: Signaling with IRQ 55 Dec 13 14:34:32.715902 kernel: pcieport 0000:00:18.7: pciehp: Slot #263 AttnBtn+ PwrCtrl+ MRL- AttnInd- PwrInd- HotPlug+ Surprise- Interlock- NoCompl+ IbPresDis- LLActRep+ Dec 13 14:34:32.715914 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 14:34:32.715939 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:34:32.715956 kernel: 00:05: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 14:34:32.715963 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBC,PNP0f13:MOUS] at 0x60,0x64 irq 1,12 Dec 13 14:34:32.715969 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Dec 13 14:34:32.715975 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Dec 13 14:34:32.716029 kernel: rtc_cmos 00:01: registered as rtc0 Dec 13 14:34:32.716072 kernel: rtc_cmos 00:01: setting system clock to 2024-12-13T14:34:32 UTC (1734100472) Dec 13 14:34:32.716116 kernel: rtc_cmos 00:01: alarms up to one month, y3k, 114 bytes nvram Dec 13 14:34:32.716124 kernel: fail to initialize ptp_kvm Dec 13 14:34:32.716130 kernel: intel_pstate: CPU model not supported Dec 13 14:34:32.716136 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:34:32.716142 kernel: Segment Routing with IPv6 Dec 13 14:34:32.716148 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:34:32.716154 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:34:32.716160 kernel: Key type dns_resolver registered Dec 13 14:34:32.716165 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Dec 13 14:34:32.716173 kernel: IPI shorthand broadcast: enabled Dec 13 14:34:32.716179 kernel: sched_clock: Marking stable (843252910, 218126278)->(1125770527, -64391339) Dec 13 14:34:32.716184 kernel: registered taskstats version 1 Dec 13 14:34:32.716190 kernel: Loading compiled-in X.509 certificates Dec 13 14:34:32.716197 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e1d88c9e01f5bb2adeb5b99325e46e5ca8dff115' Dec 13 14:34:32.716202 kernel: Key type .fscrypt registered Dec 13 14:34:32.716208 kernel: Key type fscrypt-provisioning registered Dec 13 14:34:32.716214 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:34:32.716220 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:34:32.716226 kernel: ima: No architecture policies found Dec 13 14:34:32.716232 kernel: clk: Disabling unused clocks Dec 13 14:34:32.716238 kernel: Freeing unused kernel image (initmem) memory: 47472K Dec 13 14:34:32.716243 kernel: Write protecting the kernel read-only data: 28672k Dec 13 14:34:32.716249 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 14:34:32.716255 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 14:34:32.716261 kernel: Run /init as init process Dec 13 14:34:32.716267 kernel: with arguments: Dec 13 14:34:32.716273 kernel: /init Dec 13 14:34:32.716279 kernel: with environment: Dec 13 14:34:32.716285 kernel: HOME=/ Dec 13 14:34:32.716290 kernel: TERM=linux Dec 13 14:34:32.716296 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:34:32.716303 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:34:32.716310 systemd[1]: Detected virtualization vmware. Dec 13 14:34:32.716317 systemd[1]: Detected architecture x86-64. Dec 13 14:34:32.716323 systemd[1]: Running in initrd. Dec 13 14:34:32.716330 systemd[1]: No hostname configured, using default hostname. Dec 13 14:34:32.716335 systemd[1]: Hostname set to . Dec 13 14:34:32.716342 systemd[1]: Initializing machine ID from random generator. Dec 13 14:34:32.716347 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:34:32.716353 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:34:32.716359 systemd[1]: Reached target cryptsetup.target. Dec 13 14:34:32.716365 systemd[1]: Reached target paths.target. Dec 13 14:34:32.716371 systemd[1]: Reached target slices.target. Dec 13 14:34:32.716377 systemd[1]: Reached target swap.target. Dec 13 14:34:32.716383 systemd[1]: Reached target timers.target. Dec 13 14:34:32.716391 systemd[1]: Listening on iscsid.socket. Dec 13 14:34:32.716396 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:34:32.716402 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:34:32.716409 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:34:32.716415 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:34:32.716421 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:34:32.716427 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:34:32.716433 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:34:32.716440 systemd[1]: Reached target sockets.target. Dec 13 14:34:32.716446 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:34:32.716452 systemd[1]: Finished network-cleanup.service. Dec 13 14:34:32.716458 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:34:32.716464 systemd[1]: Starting systemd-journald.service... Dec 13 14:34:32.716470 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:34:32.716478 systemd[1]: Starting systemd-resolved.service... Dec 13 14:34:32.716484 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:34:32.716490 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:34:32.716496 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:34:32.716502 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:34:32.716508 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:34:32.716514 kernel: audit: type=1130 audit(1734100472.657:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.716519 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:34:32.716525 kernel: audit: type=1130 audit(1734100472.663:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.716532 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:34:32.716538 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:34:32.716544 kernel: audit: type=1130 audit(1734100472.677:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.716550 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:34:32.716564 systemd[1]: Started systemd-resolved.service. Dec 13 14:34:32.716572 systemd[1]: Reached target nss-lookup.target. Dec 13 14:34:32.716581 kernel: audit: type=1130 audit(1734100472.684:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.716587 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:34:32.716593 kernel: Bridge firewalling registered Dec 13 14:34:32.716599 kernel: SCSI subsystem initialized Dec 13 14:34:32.716608 systemd-journald[216]: Journal started Dec 13 14:34:32.716641 systemd-journald[216]: Runtime Journal (/run/log/journal/a0fb906f2c134294af9eb7d8b95f8436) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:34:32.717640 systemd[1]: Started systemd-journald.service. Dec 13 14:34:32.717656 kernel: audit: type=1130 audit(1734100472.715:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.647585 systemd-modules-load[217]: Inserted module 'overlay' Dec 13 14:34:32.671102 systemd-resolved[218]: Positive Trust Anchors: Dec 13 14:34:32.671108 systemd-resolved[218]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:34:32.671127 systemd-resolved[218]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:34:32.684425 systemd-resolved[218]: Defaulting to hostname 'linux'. Dec 13 14:34:32.700849 systemd-modules-load[217]: Inserted module 'br_netfilter' Dec 13 14:34:32.722733 dracut-cmdline[232]: dracut-dracut-053 Dec 13 14:34:32.722733 dracut-cmdline[232]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LA Dec 13 14:34:32.722733 dracut-cmdline[232]: BEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=vmware flatcar.autologin verity.usrhash=8c474c3ec361ec863adbecaa85281a726e1b53f7863ecc4742be8c5f6d02a66e Dec 13 14:34:32.727879 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:34:32.727899 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:34:32.728909 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:34:32.730807 systemd-modules-load[217]: Inserted module 'dm_multipath' Dec 13 14:34:32.731146 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:34:32.729000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.731639 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:34:32.734569 kernel: audit: type=1130 audit(1734100472.729:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.739925 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:34:32.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.744567 kernel: audit: type=1130 audit(1734100472.740:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.745576 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:34:32.757569 kernel: iscsi: registered transport (tcp) Dec 13 14:34:32.771762 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:34:32.771785 kernel: QLogic iSCSI HBA Driver Dec 13 14:34:32.788085 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:34:32.788692 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:34:32.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.791582 kernel: audit: type=1130 audit(1734100472.786:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:32.827579 kernel: raid6: avx2x4 gen() 48644 MB/s Dec 13 14:34:32.844570 kernel: raid6: avx2x4 xor() 21718 MB/s Dec 13 14:34:32.861590 kernel: raid6: avx2x2 gen() 54024 MB/s Dec 13 14:34:32.878576 kernel: raid6: avx2x2 xor() 31926 MB/s Dec 13 14:34:32.895575 kernel: raid6: avx2x1 gen() 44938 MB/s Dec 13 14:34:32.912568 kernel: raid6: avx2x1 xor() 27776 MB/s Dec 13 14:34:32.929571 kernel: raid6: sse2x4 gen() 21146 MB/s Dec 13 14:34:32.946570 kernel: raid6: sse2x4 xor() 11877 MB/s Dec 13 14:34:32.963582 kernel: raid6: sse2x2 gen() 21285 MB/s Dec 13 14:34:32.980576 kernel: raid6: sse2x2 xor() 13303 MB/s Dec 13 14:34:32.997580 kernel: raid6: sse2x1 gen() 17961 MB/s Dec 13 14:34:33.014790 kernel: raid6: sse2x1 xor() 8799 MB/s Dec 13 14:34:33.014834 kernel: raid6: using algorithm avx2x2 gen() 54024 MB/s Dec 13 14:34:33.014842 kernel: raid6: .... xor() 31926 MB/s, rmw enabled Dec 13 14:34:33.015941 kernel: raid6: using avx2x2 recovery algorithm Dec 13 14:34:33.024579 kernel: xor: automatically using best checksumming function avx Dec 13 14:34:33.084578 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 14:34:33.088913 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:34:33.089554 systemd[1]: Starting systemd-udevd.service... Dec 13 14:34:33.087000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.087000 audit: BPF prog-id=7 op=LOAD Dec 13 14:34:33.087000 audit: BPF prog-id=8 op=LOAD Dec 13 14:34:33.092575 kernel: audit: type=1130 audit(1734100473.087:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.099782 systemd-udevd[416]: Using default interface naming scheme 'v252'. Dec 13 14:34:33.102478 systemd[1]: Started systemd-udevd.service. Dec 13 14:34:33.103226 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:34:33.101000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.111968 dracut-pre-trigger[423]: rd.md=0: removing MD RAID activation Dec 13 14:34:33.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.129379 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:34:33.129958 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:34:33.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:33.190825 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:34:33.251681 kernel: VMware PVSCSI driver - version 1.0.7.0-k Dec 13 14:34:33.251717 kernel: vmw_pvscsi: using 64bit dma Dec 13 14:34:33.257840 kernel: vmw_pvscsi: max_id: 16 Dec 13 14:34:33.257874 kernel: vmw_pvscsi: setting ring_pages to 8 Dec 13 14:34:33.262567 kernel: libata version 3.00 loaded. Dec 13 14:34:33.266590 kernel: VMware vmxnet3 virtual NIC driver - version 1.6.0.0-k-NAPI Dec 13 14:34:33.272590 kernel: vmxnet3 0000:0b:00.0: # of Tx queues : 2, # of Rx queues : 2 Dec 13 14:34:33.283026 kernel: ata_piix 0000:00:07.1: version 2.13 Dec 13 14:34:33.293034 kernel: vmw_pvscsi: enabling reqCallThreshold Dec 13 14:34:33.293046 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:34:33.293056 kernel: vmw_pvscsi: driver-based request coalescing enabled Dec 13 14:34:33.293063 kernel: vmw_pvscsi: using MSI-X Dec 13 14:34:33.293070 kernel: scsi host0: VMware PVSCSI storage adapter rev 2, req/cmp/msg rings: 8/8/1 pages, cmd_per_lun=254 Dec 13 14:34:33.293138 kernel: vmw_pvscsi 0000:03:00.0: VMware PVSCSI rev 2 host #0 Dec 13 14:34:33.293196 kernel: vmxnet3 0000:0b:00.0 eth0: NIC Link is Up 10000 Mbps Dec 13 14:34:33.293251 kernel: scsi 0:0:0:0: Direct-Access VMware Virtual disk 2.0 PQ: 0 ANSI: 6 Dec 13 14:34:33.293310 kernel: scsi host1: ata_piix Dec 13 14:34:33.293367 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 14:34:33.293375 kernel: AES CTR mode by8 optimization enabled Dec 13 14:34:33.293383 kernel: vmxnet3 0000:0b:00.0 ens192: renamed from eth0 Dec 13 14:34:33.293437 kernel: scsi host2: ata_piix Dec 13 14:34:33.293491 kernel: ata1: PATA max UDMA/33 cmd 0x1f0 ctl 0x3f6 bmdma 0x1060 irq 14 Dec 13 14:34:33.293499 kernel: ata2: PATA max UDMA/33 cmd 0x170 ctl 0x376 bmdma 0x1068 irq 15 Dec 13 14:34:33.459570 kernel: ata2.00: ATAPI: VMware Virtual IDE CDROM Drive, 00000001, max UDMA/33 Dec 13 14:34:33.467567 kernel: scsi 2:0:0:0: CD-ROM NECVMWar VMware IDE CDR10 1.00 PQ: 0 ANSI: 5 Dec 13 14:34:33.473121 kernel: sd 0:0:0:0: [sda] 17805312 512-byte logical blocks: (9.12 GB/8.49 GiB) Dec 13 14:34:33.478374 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:34:33.478444 kernel: sd 0:0:0:0: [sda] Mode Sense: 31 00 00 00 Dec 13 14:34:33.478501 kernel: sd 0:0:0:0: [sda] Cache data unavailable Dec 13 14:34:33.478566 kernel: sd 0:0:0:0: [sda] Assuming drive cache: write through Dec 13 14:34:33.478629 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:33.478637 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:34:33.500976 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 1x/1x writer dvd-ram cd/rw xa/form2 cdda tray Dec 13 14:34:33.524449 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:34:33.524485 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (471) Dec 13 14:34:33.524496 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 Dec 13 14:34:33.503832 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:34:33.507900 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:34:33.509613 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:34:33.509718 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:34:33.510258 systemd[1]: Starting disk-uuid.service... Dec 13 14:34:33.513489 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:34:33.534573 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:33.538570 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:33.542570 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:34.560179 disk-uuid[548]: The operation has completed successfully. Dec 13 14:34:34.563453 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:34:34.595361 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:34:34.595651 systemd[1]: Finished disk-uuid.service. Dec 13 14:34:34.594000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.596346 systemd[1]: Starting verity-setup.service... Dec 13 14:34:34.606574 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 14:34:34.645449 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:34:34.645907 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:34:34.646554 systemd[1]: Finished verity-setup.service. Dec 13 14:34:34.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.694573 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:34:34.694895 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:34:34.695464 systemd[1]: Starting afterburn-network-kargs.service... Dec 13 14:34:34.695977 systemd[1]: Starting ignition-setup.service... Dec 13 14:34:34.714325 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:34:34.714359 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:34:34.714371 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:34:34.720660 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:34:34.730838 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:34:34.736221 systemd[1]: Finished ignition-setup.service. Dec 13 14:34:34.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.736781 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:34:34.779426 systemd[1]: Finished afterburn-network-kargs.service. Dec 13 14:34:34.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.780086 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:34:34.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.821753 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:34:34.820000 audit: BPF prog-id=9 op=LOAD Dec 13 14:34:34.822614 systemd[1]: Starting systemd-networkd.service... Dec 13 14:34:34.839459 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:34:34.839588 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:34:34.836070 systemd-networkd[735]: lo: Link UP Dec 13 14:34:34.836074 systemd-networkd[735]: lo: Gained carrier Dec 13 14:34:34.836333 systemd-networkd[735]: Enumeration completed Dec 13 14:34:34.836382 systemd[1]: Started systemd-networkd.service. Dec 13 14:34:34.836526 systemd[1]: Reached target network.target. Dec 13 14:34:34.836538 systemd-networkd[735]: ens192: Configuring with /etc/systemd/network/10-dracut-cmdline-99.network. Dec 13 14:34:34.836996 systemd[1]: Starting iscsiuio.service... Dec 13 14:34:34.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.841373 systemd-networkd[735]: ens192: Link UP Dec 13 14:34:34.841492 systemd-networkd[735]: ens192: Gained carrier Dec 13 14:34:34.842766 systemd[1]: Started iscsiuio.service. Dec 13 14:34:34.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.843585 systemd[1]: Starting iscsid.service... Dec 13 14:34:34.845577 iscsid[740]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:34:34.845577 iscsid[740]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:34:34.845577 iscsid[740]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:34:34.845577 iscsid[740]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:34:34.846954 iscsid[740]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:34:34.846954 iscsid[740]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:34:34.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.846354 systemd[1]: Started iscsid.service. Dec 13 14:34:34.847582 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:34:34.854631 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:34:34.854810 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:34:34.853000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.854910 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:34:34.854997 systemd[1]: Reached target remote-fs.target. Dec 13 14:34:34.855505 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:34:34.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.862600 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:34:34.874974 ignition[606]: Ignition 2.14.0 Dec 13 14:34:34.874982 ignition[606]: Stage: fetch-offline Dec 13 14:34:34.875018 ignition[606]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:34.875033 ignition[606]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:34.877860 ignition[606]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:34.877927 ignition[606]: parsed url from cmdline: "" Dec 13 14:34:34.877929 ignition[606]: no config URL provided Dec 13 14:34:34.877932 ignition[606]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:34:34.877937 ignition[606]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:34:34.878288 ignition[606]: config successfully fetched Dec 13 14:34:34.878303 ignition[606]: parsing config with SHA512: 0e12c95890d796b2e9d5eec047855cf30cb0ca21ad266993d4028f09908a44e821afc40a7a3c3bbeb186a284113e02c0b84b299625318e5d41c2f46a414099f4 Dec 13 14:34:34.888358 unknown[606]: fetched base config from "system" Dec 13 14:34:34.888366 unknown[606]: fetched user config from "vmware" Dec 13 14:34:34.889050 ignition[606]: fetch-offline: fetch-offline passed Dec 13 14:34:34.889104 ignition[606]: Ignition finished successfully Dec 13 14:34:34.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.890263 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:34:34.890458 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Dec 13 14:34:34.891048 systemd[1]: Starting ignition-kargs.service... Dec 13 14:34:34.896901 ignition[754]: Ignition 2.14.0 Dec 13 14:34:34.897111 ignition[754]: Stage: kargs Dec 13 14:34:34.897304 ignition[754]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:34.897475 ignition[754]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:34.898933 ignition[754]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:34.900606 ignition[754]: kargs: kargs passed Dec 13 14:34:34.900761 ignition[754]: Ignition finished successfully Dec 13 14:34:34.901600 systemd[1]: Finished ignition-kargs.service. Dec 13 14:34:34.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.902148 systemd[1]: Starting ignition-disks.service... Dec 13 14:34:34.906231 ignition[760]: Ignition 2.14.0 Dec 13 14:34:34.906586 ignition[760]: Stage: disks Dec 13 14:34:34.906758 ignition[760]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:34.906911 ignition[760]: parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:34.908197 ignition[760]: no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:34.910001 ignition[760]: disks: disks passed Dec 13 14:34:34.910135 ignition[760]: Ignition finished successfully Dec 13 14:34:34.910696 systemd[1]: Finished ignition-disks.service. Dec 13 14:34:34.910854 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:34:34.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.910961 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:34:34.911115 systemd[1]: Reached target local-fs.target. Dec 13 14:34:34.911268 systemd[1]: Reached target sysinit.target. Dec 13 14:34:34.911428 systemd[1]: Reached target basic.target. Dec 13 14:34:34.912010 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:34:34.923216 systemd-fsck[768]: ROOT: clean, 621/1628000 files, 124058/1617920 blocks Dec 13 14:34:34.924573 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:34:34.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:34.925126 systemd[1]: Mounting sysroot.mount... Dec 13 14:34:34.934326 systemd[1]: Mounted sysroot.mount. Dec 13 14:34:34.934462 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:34:34.934700 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:34:34.935343 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:34:34.935790 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Dec 13 14:34:34.935840 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:34:34.935863 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:34:34.937966 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:34:34.938507 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:34:34.941298 initrd-setup-root[778]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:34:34.956832 initrd-setup-root[786]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:34:34.962399 initrd-setup-root[794]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:34:34.966655 initrd-setup-root[802]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:34:35.008649 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:34:35.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:35.009487 systemd[1]: Starting ignition-mount.service... Dec 13 14:34:35.010107 systemd[1]: Starting sysroot-boot.service... Dec 13 14:34:35.014415 bash[819]: umount: /sysroot/usr/share/oem: not mounted. Dec 13 14:34:35.020204 ignition[820]: INFO : Ignition 2.14.0 Dec 13 14:34:35.020480 ignition[820]: INFO : Stage: mount Dec 13 14:34:35.020680 ignition[820]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:35.020854 ignition[820]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:35.022563 ignition[820]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:35.024393 ignition[820]: INFO : mount: mount passed Dec 13 14:34:35.024593 ignition[820]: INFO : Ignition finished successfully Dec 13 14:34:35.025151 systemd[1]: Finished ignition-mount.service. Dec 13 14:34:35.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:35.028946 systemd[1]: Finished sysroot-boot.service. Dec 13 14:34:35.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:35.662185 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:34:35.701592 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (829) Dec 13 14:34:35.704366 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 14:34:35.704391 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:34:35.704402 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:34:35.711243 kernel: BTRFS info (device sda6): enabling ssd optimizations Dec 13 14:34:35.711118 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:34:35.712141 systemd[1]: Starting ignition-files.service... Dec 13 14:34:35.724517 ignition[849]: INFO : Ignition 2.14.0 Dec 13 14:34:35.724883 ignition[849]: INFO : Stage: files Dec 13 14:34:35.725162 ignition[849]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:35.725375 ignition[849]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:35.727514 ignition[849]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:35.730341 ignition[849]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:34:35.730921 ignition[849]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:34:35.730921 ignition[849]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:34:35.733208 ignition[849]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:34:35.733463 ignition[849]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:34:35.734320 unknown[849]: wrote ssh authorized keys file for user: core Dec 13 14:34:35.734582 ignition[849]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:34:35.734911 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:34:35.735126 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 14:34:35.782466 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:34:35.852432 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 14:34:35.852729 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:34:35.853031 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:34:35.853217 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:34:35.853471 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:34:35.853661 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:34:35.853960 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:34:35.854147 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:34:35.854399 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:34:35.865719 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:34:35.866018 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:34:35.866265 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:34:35.866586 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:34:35.873095 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:34:35.873391 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:34:35.912580 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3561725863" Dec 13 14:34:35.915647 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (849) Dec 13 14:34:35.915667 ignition[849]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3561725863": device or resource busy Dec 13 14:34:35.915667 ignition[849]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3561725863", trying btrfs: device or resource busy Dec 13 14:34:35.915667 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3561725863" Dec 13 14:34:35.915667 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3561725863" Dec 13 14:34:35.923730 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem3561725863" Dec 13 14:34:35.923959 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem3561725863" Dec 13 14:34:35.923959 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/vmtoolsd.service" Dec 13 14:34:35.923959 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:34:35.923959 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 14:34:35.924957 systemd[1]: mnt-oem3561725863.mount: Deactivated successfully. Dec 13 14:34:36.274666 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): GET result: OK Dec 13 14:34:36.463821 systemd-networkd[735]: ens192: Gained IPv6LL Dec 13 14:34:36.477716 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 14:34:36.478277 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:34:36.478601 ignition[849]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/network/00-vmware.network" Dec 13 14:34:36.478809 ignition[849]: INFO : files: op(10): [started] processing unit "vmtoolsd.service" Dec 13 14:34:36.478960 ignition[849]: INFO : files: op(10): [finished] processing unit "vmtoolsd.service" Dec 13 14:34:36.479113 ignition[849]: INFO : files: op(11): [started] processing unit "prepare-helm.service" Dec 13 14:34:36.479303 ignition[849]: INFO : files: op(11): op(12): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:34:36.479544 ignition[849]: INFO : files: op(11): op(12): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:34:36.479740 ignition[849]: INFO : files: op(11): [finished] processing unit "prepare-helm.service" Dec 13 14:34:36.479906 ignition[849]: INFO : files: op(13): [started] processing unit "coreos-metadata.service" Dec 13 14:34:36.480090 ignition[849]: INFO : files: op(13): op(14): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:34:36.480333 ignition[849]: INFO : files: op(13): op(14): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Dec 13 14:34:36.480526 ignition[849]: INFO : files: op(13): [finished] processing unit "coreos-metadata.service" Dec 13 14:34:36.480693 ignition[849]: INFO : files: op(15): [started] setting preset to enabled for "vmtoolsd.service" Dec 13 14:34:36.480898 ignition[849]: INFO : files: op(15): [finished] setting preset to enabled for "vmtoolsd.service" Dec 13 14:34:36.481057 ignition[849]: INFO : files: op(16): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:34:36.481233 ignition[849]: INFO : files: op(16): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:34:36.481409 ignition[849]: INFO : files: op(17): [started] setting preset to disabled for "coreos-metadata.service" Dec 13 14:34:36.481591 ignition[849]: INFO : files: op(17): op(18): [started] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:34:36.528250 ignition[849]: INFO : files: op(17): op(18): [finished] removing enablement symlink(s) for "coreos-metadata.service" Dec 13 14:34:36.528535 ignition[849]: INFO : files: op(17): [finished] setting preset to disabled for "coreos-metadata.service" Dec 13 14:34:36.528829 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:34:36.529080 ignition[849]: INFO : files: createResultFile: createFiles: op(19): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:34:36.529278 ignition[849]: INFO : files: files passed Dec 13 14:34:36.529421 ignition[849]: INFO : Ignition finished successfully Dec 13 14:34:36.530160 systemd[1]: Finished ignition-files.service. Dec 13 14:34:36.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.531512 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:34:36.531647 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:34:36.532016 systemd[1]: Starting ignition-quench.service... Dec 13 14:34:36.533000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.534668 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:34:36.534717 systemd[1]: Finished ignition-quench.service. Dec 13 14:34:36.535981 initrd-setup-root-after-ignition[875]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:34:36.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.536330 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:34:36.536469 systemd[1]: Reached target ignition-complete.target. Dec 13 14:34:36.536945 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:34:36.544969 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:34:36.545183 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:34:36.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.545542 systemd[1]: Reached target initrd-fs.target. Dec 13 14:34:36.545762 systemd[1]: Reached target initrd.target. Dec 13 14:34:36.545999 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:34:36.546585 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:34:36.553133 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:34:36.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.553913 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:34:36.559617 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:34:36.559911 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:34:36.560193 systemd[1]: Stopped target timers.target. Dec 13 14:34:36.560449 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:34:36.560706 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:34:36.559000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.561070 systemd[1]: Stopped target initrd.target. Dec 13 14:34:36.561323 systemd[1]: Stopped target basic.target. Dec 13 14:34:36.561595 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:34:36.561870 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:34:36.562131 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:34:36.562394 systemd[1]: Stopped target remote-fs.target. Dec 13 14:34:36.562671 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:34:36.562940 systemd[1]: Stopped target sysinit.target. Dec 13 14:34:36.563198 systemd[1]: Stopped target local-fs.target. Dec 13 14:34:36.563447 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:34:36.563716 systemd[1]: Stopped target swap.target. Dec 13 14:34:36.563950 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:34:36.564147 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:34:36.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.564500 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:34:36.564788 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:34:36.565000 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:34:36.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.565318 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:34:36.565520 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:34:36.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.565873 systemd[1]: Stopped target paths.target. Dec 13 14:34:36.566100 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:34:36.569579 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:34:36.569855 systemd[1]: Stopped target slices.target. Dec 13 14:34:36.570107 systemd[1]: Stopped target sockets.target. Dec 13 14:34:36.570351 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:34:36.570529 systemd[1]: Closed iscsid.socket. Dec 13 14:34:36.570784 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:34:36.570962 systemd[1]: Closed iscsiuio.socket. Dec 13 14:34:36.571212 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:34:36.571421 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:34:36.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.571778 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:34:36.571978 systemd[1]: Stopped ignition-files.service. Dec 13 14:34:36.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.572728 systemd[1]: Stopping ignition-mount.service... Dec 13 14:34:36.573375 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:34:36.573647 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:34:36.573859 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:34:36.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.574201 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:34:36.574395 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:34:36.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.578016 ignition[888]: INFO : Ignition 2.14.0 Dec 13 14:34:36.578016 ignition[888]: INFO : Stage: umount Dec 13 14:34:36.578016 ignition[888]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:34:36.578016 ignition[888]: DEBUG : parsing config with SHA512: bd85a898f7da4744ff98e02742aa4854e1ceea8026a4e95cb6fb599b39b54cff0db353847df13d3c55ae196a9dc5d648977228d55e5da3ea20cd600fa7cec8ed Dec 13 14:34:36.578680 ignition[888]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/vmware" Dec 13 14:34:36.580426 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:34:36.580571 ignition[888]: INFO : umount: umount passed Dec 13 14:34:36.580571 ignition[888]: INFO : Ignition finished successfully Dec 13 14:34:36.581119 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:34:36.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.579000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.581595 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:34:36.581779 systemd[1]: Stopped ignition-mount.service. Dec 13 14:34:36.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.582475 systemd[1]: Stopped target network.target. Dec 13 14:34:36.582698 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:34:36.582851 systemd[1]: Stopped ignition-disks.service. Dec 13 14:34:36.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.583106 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:34:36.583255 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:34:36.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.583509 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:34:36.583670 systemd[1]: Stopped ignition-setup.service. Dec 13 14:34:36.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.584204 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:34:36.584548 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:34:36.588713 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:34:36.588766 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:34:36.589009 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:34:36.589026 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:34:36.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.589786 systemd[1]: Stopping network-cleanup.service... Dec 13 14:34:36.589893 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:34:36.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.589921 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:34:36.590094 systemd[1]: afterburn-network-kargs.service: Deactivated successfully. Dec 13 14:34:36.590120 systemd[1]: Stopped afterburn-network-kargs.service. Dec 13 14:34:36.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=afterburn-network-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.591004 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:34:36.591028 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:34:36.591170 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:34:36.591191 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:34:36.592000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:34:36.591336 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:34:36.592000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.593510 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:34:36.593873 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:34:36.593921 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:34:36.595487 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:34:36.595577 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:34:36.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.595966 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:34:36.595986 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:34:36.596182 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:34:36.596197 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:34:36.594000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.595000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:34:36.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.596350 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:34:36.596371 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:34:36.596541 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:34:36.596639 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:34:36.596735 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:34:36.596756 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:34:36.597188 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:34:36.597322 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:34:36.597351 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:34:36.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.599799 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:34:36.599825 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:34:36.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.600237 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:34:36.600261 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:34:36.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.600879 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:34:36.600929 systemd[1]: Stopped network-cleanup.service. Dec 13 14:34:36.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.601404 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:34:36.601445 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:34:36.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.648354 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:34:36.648414 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:34:36.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.648988 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:34:36.649237 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:34:36.649265 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:34:36.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:36.650126 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:34:36.657500 systemd[1]: Switching root. Dec 13 14:34:36.672931 iscsid[740]: iscsid shutting down. Dec 13 14:34:36.673122 systemd-journald[216]: Journal stopped Dec 13 14:34:40.650814 systemd-journald[216]: Received SIGTERM from PID 1 (n/a). Dec 13 14:34:40.650835 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:34:40.650843 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:34:40.650849 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:34:40.650854 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:34:40.650860 kernel: SELinux: policy capability open_perms=1 Dec 13 14:34:40.650867 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:34:40.650873 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:34:40.650878 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:34:40.650884 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:34:40.650889 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:34:40.650894 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:34:40.650901 kernel: kauditd_printk_skb: 65 callbacks suppressed Dec 13 14:34:40.650907 kernel: audit: type=1403 audit(1734100477.092:76): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:34:40.650914 systemd[1]: Successfully loaded SELinux policy in 113.055ms. Dec 13 14:34:40.650922 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.346ms. Dec 13 14:34:40.650929 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:34:40.650936 systemd[1]: Detected virtualization vmware. Dec 13 14:34:40.650943 systemd[1]: Detected architecture x86-64. Dec 13 14:34:40.650949 systemd[1]: Detected first boot. Dec 13 14:34:40.650957 systemd[1]: Initializing machine ID from random generator. Dec 13 14:34:40.650964 kernel: audit: type=1400 audit(1734100477.414:77): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:40.650970 kernel: audit: type=1400 audit(1734100477.414:78): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:40.650977 kernel: audit: type=1334 audit(1734100477.417:79): prog-id=10 op=LOAD Dec 13 14:34:40.650983 kernel: audit: type=1334 audit(1734100477.417:80): prog-id=10 op=UNLOAD Dec 13 14:34:40.650989 kernel: audit: type=1334 audit(1734100477.419:81): prog-id=11 op=LOAD Dec 13 14:34:40.650994 kernel: audit: type=1334 audit(1734100477.419:82): prog-id=11 op=UNLOAD Dec 13 14:34:40.651000 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:34:40.651007 kernel: audit: type=1400 audit(1734100477.595:83): avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:34:40.651013 kernel: audit: type=1300 audit(1734100477.595:83): arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.651020 kernel: audit: type=1327 audit(1734100477.595:83): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:34:40.651027 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:34:40.651033 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:34:40.651040 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:34:40.651047 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:34:40.651054 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:34:40.651060 systemd[1]: Stopped iscsiuio.service. Dec 13 14:34:40.651067 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:34:40.651074 systemd[1]: Stopped iscsid.service. Dec 13 14:34:40.651080 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:34:40.651088 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:34:40.651096 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:34:40.651102 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:34:40.651109 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:34:40.651116 systemd[1]: Created slice system-getty.slice. Dec 13 14:34:40.651123 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:34:40.651130 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:34:40.651137 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:34:40.651144 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:34:40.651154 systemd[1]: Created slice user.slice. Dec 13 14:34:40.651163 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:34:40.651170 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:34:40.651177 systemd[1]: Set up automount boot.automount. Dec 13 14:34:40.651183 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:34:40.651192 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:34:40.651198 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:34:40.651205 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:34:40.651211 systemd[1]: Reached target integritysetup.target. Dec 13 14:34:40.651218 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:34:40.651225 systemd[1]: Reached target remote-fs.target. Dec 13 14:34:40.651231 systemd[1]: Reached target slices.target. Dec 13 14:34:40.651238 systemd[1]: Reached target swap.target. Dec 13 14:34:40.651247 systemd[1]: Reached target torcx.target. Dec 13 14:34:40.651253 systemd[1]: Reached target veritysetup.target. Dec 13 14:34:40.651261 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:34:40.651267 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:34:40.651275 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:34:40.651282 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:34:40.651289 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:34:40.651295 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:34:40.651302 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:34:40.651309 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:34:40.651316 systemd[1]: Mounting media.mount... Dec 13 14:34:40.651323 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:40.651329 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:34:40.651337 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:34:40.651344 systemd[1]: Mounting tmp.mount... Dec 13 14:34:40.651351 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:34:40.651358 systemd[1]: Starting ignition-delete-config.service... Dec 13 14:34:40.651364 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:34:40.651371 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:34:40.651378 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:34:40.651385 systemd[1]: Starting modprobe@drm.service... Dec 13 14:34:40.651392 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:34:40.651400 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:34:40.651406 systemd[1]: Starting modprobe@loop.service... Dec 13 14:34:40.651414 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:34:40.651420 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:34:40.651427 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:34:40.651434 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:34:40.651441 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:34:40.651447 systemd[1]: Stopped systemd-journald.service. Dec 13 14:34:40.651454 systemd[1]: Starting systemd-journald.service... Dec 13 14:34:40.651462 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:34:40.651469 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:34:40.651476 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:34:40.651482 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:34:40.651489 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:34:40.651496 systemd[1]: Stopped verity-setup.service. Dec 13 14:34:40.651503 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:40.651509 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:34:40.651516 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:34:40.651524 systemd[1]: Mounted media.mount. Dec 13 14:34:40.651531 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:34:40.651538 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:34:40.651545 systemd[1]: Mounted tmp.mount. Dec 13 14:34:40.651551 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:34:40.651581 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:34:40.651591 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:34:40.651598 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:34:40.651605 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:34:40.651613 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:34:40.651620 systemd[1]: Finished modprobe@drm.service. Dec 13 14:34:40.651630 systemd-journald[1002]: Journal started Dec 13 14:34:40.651657 systemd-journald[1002]: Runtime Journal (/run/log/journal/b965d2bc18d646c0b64d66ede872311e) is 4.8M, max 38.8M, 34.0M free. Dec 13 14:34:37.092000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:34:37.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:37.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:34:37.417000 audit: BPF prog-id=10 op=LOAD Dec 13 14:34:37.417000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:34:37.419000 audit: BPF prog-id=11 op=LOAD Dec 13 14:34:37.419000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:34:37.595000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:34:37.595000 audit[922]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.595000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:34:37.596000 audit[922]: AVC avc: denied { associate } for pid=922 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:34:37.596000 audit[922]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179b9 a2=1ed a3=0 items=2 ppid=905 pid=922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:37.596000 audit: CWD cwd="/" Dec 13 14:34:37.596000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:37.596000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:37.596000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:34:40.509000 audit: BPF prog-id=12 op=LOAD Dec 13 14:34:40.509000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:34:40.509000 audit: BPF prog-id=13 op=LOAD Dec 13 14:34:40.509000 audit: BPF prog-id=14 op=LOAD Dec 13 14:34:40.509000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:34:40.509000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:34:40.510000 audit: BPF prog-id=15 op=LOAD Dec 13 14:34:40.510000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:34:40.510000 audit: BPF prog-id=16 op=LOAD Dec 13 14:34:40.510000 audit: BPF prog-id=17 op=LOAD Dec 13 14:34:40.510000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:34:40.510000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:34:40.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.514000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:34:40.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.597000 audit: BPF prog-id=18 op=LOAD Dec 13 14:34:40.597000 audit: BPF prog-id=19 op=LOAD Dec 13 14:34:40.597000 audit: BPF prog-id=20 op=LOAD Dec 13 14:34:40.597000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:34:40.597000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:34:40.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.642000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.644000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.644000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.647000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:34:40.647000 audit[1002]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffc4a49f5b0 a2=4000 a3=7ffc4a49f64c items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:40.647000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:34:40.647000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:37.594756 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:34:40.508512 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:34:40.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:37.595229 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:34:40.512331 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:34:37.595241 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:34:37.595260 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:34:37.595266 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:34:37.595284 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:34:37.595291 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:34:37.595419 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:34:37.595441 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:34:40.653222 jq[989]: true Dec 13 14:34:37.595449 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:34:37.596101 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:34:37.596121 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:34:37.596131 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:34:40.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.653595 systemd[1]: Started systemd-journald.service. Dec 13 14:34:37.596140 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:34:37.596149 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:34:37.596156 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:37Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:34:39.913443 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:34:39.913632 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:34:39.913814 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:34:39.914107 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:34:39.914154 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:34:40.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.653000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:39.914211 /usr/lib/systemd/system-generators/torcx-generator[922]: time="2024-12-13T14:34:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:34:40.654379 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:34:40.654464 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:34:40.654758 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:34:40.655001 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:34:40.656916 systemd[1]: Reached target network-pre.target. Dec 13 14:34:40.657793 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:34:40.659455 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:34:40.662282 jq[1011]: true Dec 13 14:34:40.662579 kernel: fuse: init (API version 7.34) Dec 13 14:34:40.667574 kernel: loop: module loaded Dec 13 14:34:40.674200 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:34:40.675094 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:34:40.675231 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:34:40.675979 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:34:40.676936 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:34:40.677027 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:34:40.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.677382 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:34:40.677469 systemd[1]: Finished modprobe@loop.service. Dec 13 14:34:40.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.677724 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:34:40.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.678287 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:34:40.679282 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:34:40.679407 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:34:40.680752 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:34:40.682185 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:34:40.691432 systemd-journald[1002]: Time spent on flushing to /var/log/journal/b965d2bc18d646c0b64d66ede872311e is 40.472ms for 2011 entries. Dec 13 14:34:40.691432 systemd-journald[1002]: System Journal (/var/log/journal/b965d2bc18d646c0b64d66ede872311e) is 8.0M, max 584.8M, 576.8M free. Dec 13 14:34:40.814309 systemd-journald[1002]: Received client request to flush runtime journal. Dec 13 14:34:40.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.698353 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:34:40.698531 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:34:40.703172 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:34:40.815300 udevadm[1048]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:34:40.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.704173 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:34:40.756100 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:34:40.771996 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:34:40.773016 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:34:40.815222 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:34:40.887922 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:34:40.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:40.889206 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:34:41.048892 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:34:41.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.105578 ignition[1033]: Ignition 2.14.0 Dec 13 14:34:41.106070 ignition[1033]: deleting config from guestinfo properties Dec 13 14:34:41.110193 ignition[1033]: Successfully deleted config Dec 13 14:34:41.110888 systemd[1]: Finished ignition-delete-config.service. Dec 13 14:34:41.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ignition-delete-config comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.362623 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:34:41.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.361000 audit: BPF prog-id=21 op=LOAD Dec 13 14:34:41.361000 audit: BPF prog-id=22 op=LOAD Dec 13 14:34:41.361000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:34:41.361000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:34:41.363726 systemd[1]: Starting systemd-udevd.service... Dec 13 14:34:41.375245 systemd-udevd[1056]: Using default interface naming scheme 'v252'. Dec 13 14:34:41.512512 systemd[1]: Started systemd-udevd.service. Dec 13 14:34:41.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.511000 audit: BPF prog-id=23 op=LOAD Dec 13 14:34:41.513928 systemd[1]: Starting systemd-networkd.service... Dec 13 14:34:41.520000 audit: BPF prog-id=24 op=LOAD Dec 13 14:34:41.520000 audit: BPF prog-id=25 op=LOAD Dec 13 14:34:41.520000 audit: BPF prog-id=26 op=LOAD Dec 13 14:34:41.522398 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:34:41.544858 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 14:34:41.547058 systemd[1]: Started systemd-userdbd.service. Dec 13 14:34:41.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.580600 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Dec 13 14:34:41.586572 kernel: ACPI: button: Power Button [PWRF] Dec 13 14:34:41.651000 audit[1061]: AVC avc: denied { confidentiality } for pid=1061 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:34:41.651000 audit[1061]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55fb23c67750 a1=337fc a2=7f9fbc068bc5 a3=5 items=110 ppid=1056 pid=1061 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:41.651000 audit: CWD cwd="/" Dec 13 14:34:41.651000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=1 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=2 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=3 name=(null) inode=23426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=4 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=5 name=(null) inode=23427 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=6 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=7 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=8 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=9 name=(null) inode=23429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=10 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=11 name=(null) inode=23430 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=12 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=13 name=(null) inode=23431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=14 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=15 name=(null) inode=23432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=16 name=(null) inode=23428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=17 name=(null) inode=23433 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=18 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=19 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=20 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=21 name=(null) inode=23435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=22 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=23 name=(null) inode=23436 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=24 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=25 name=(null) inode=23437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=26 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=27 name=(null) inode=23438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=28 name=(null) inode=23434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=29 name=(null) inode=23439 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=30 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=31 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=32 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=33 name=(null) inode=23441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=34 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=35 name=(null) inode=23442 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=36 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=37 name=(null) inode=23443 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=38 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=39 name=(null) inode=23444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=40 name=(null) inode=23440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=41 name=(null) inode=23445 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=42 name=(null) inode=23425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=43 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=44 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=45 name=(null) inode=23447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=46 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=47 name=(null) inode=23448 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=48 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=49 name=(null) inode=23449 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=50 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=51 name=(null) inode=23450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=52 name=(null) inode=23446 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=53 name=(null) inode=23451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=55 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=56 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=57 name=(null) inode=23453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=58 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=59 name=(null) inode=23454 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=60 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=61 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=62 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=63 name=(null) inode=23456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=64 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=65 name=(null) inode=23457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=66 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=67 name=(null) inode=23458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=68 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=69 name=(null) inode=23459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=70 name=(null) inode=23455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=71 name=(null) inode=23460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=72 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=73 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=74 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=75 name=(null) inode=23462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=76 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=77 name=(null) inode=23463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=78 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=79 name=(null) inode=23464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=80 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=81 name=(null) inode=23465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=82 name=(null) inode=23461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=83 name=(null) inode=23466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=84 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=85 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=86 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=87 name=(null) inode=23468 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=88 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=89 name=(null) inode=23469 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=90 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=91 name=(null) inode=23470 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=92 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=93 name=(null) inode=23471 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=94 name=(null) inode=23467 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=95 name=(null) inode=23472 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=96 name=(null) inode=23452 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=97 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=98 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=99 name=(null) inode=23474 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=100 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=101 name=(null) inode=23475 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=102 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=103 name=(null) inode=23476 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=104 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=105 name=(null) inode=23477 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=106 name=(null) inode=23473 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=107 name=(null) inode=23478 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PATH item=109 name=(null) inode=23479 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:34:41.651000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:34:41.662592 kernel: vmw_vmci 0000:00:07.7: Found VMCI PCI device at 0x11080, irq 16 Dec 13 14:34:41.669324 kernel: vmw_vmci 0000:00:07.7: Using capabilities 0xc Dec 13 14:34:41.672653 kernel: Guest personality initialized and is active Dec 13 14:34:41.672694 kernel: VMCI host device registered (name=vmci, major=10, minor=125) Dec 13 14:34:41.672710 kernel: Initialized host personality Dec 13 14:34:41.676576 kernel: piix4_smbus 0000:00:07.3: SMBus Host Controller not enabled! Dec 13 14:34:41.684601 kernel: input: ImPS/2 Generic Wheel Mouse as /devices/platform/i8042/serio1/input/input3 Dec 13 14:34:41.691616 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1060) Dec 13 14:34:41.695725 systemd-networkd[1063]: lo: Link UP Dec 13 14:34:41.695730 systemd-networkd[1063]: lo: Gained carrier Dec 13 14:34:41.696402 systemd-networkd[1063]: Enumeration completed Dec 13 14:34:41.696513 systemd-networkd[1063]: ens192: Configuring with /etc/systemd/network/00-vmware.network. Dec 13 14:34:41.697071 systemd[1]: Started systemd-networkd.service. Dec 13 14:34:41.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.699885 kernel: vmxnet3 0000:0b:00.0 ens192: intr type 3, mode 0, 3 vectors allocated Dec 13 14:34:41.700037 kernel: vmxnet3 0000:0b:00.0 ens192: NIC Link is Up 10000 Mbps Dec 13 14:34:41.701261 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): ens192: link becomes ready Dec 13 14:34:41.701608 systemd-networkd[1063]: ens192: Link UP Dec 13 14:34:41.701761 systemd-networkd[1063]: ens192: Gained carrier Dec 13 14:34:41.711161 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:34:41.714772 (udev-worker)[1057]: id: Truncating stdout of 'dmi_memory_id' up to 16384 byte. Dec 13 14:34:41.723576 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:34:41.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.736874 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:34:41.737870 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:34:41.844781 lvm[1089]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:34:41.868317 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:34:41.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.868611 systemd[1]: Reached target cryptsetup.target. Dec 13 14:34:41.869654 systemd[1]: Starting lvm2-activation.service... Dec 13 14:34:41.872742 lvm[1090]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:34:41.900197 systemd[1]: Finished lvm2-activation.service. Dec 13 14:34:41.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.900411 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:34:41.900528 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:34:41.900546 systemd[1]: Reached target local-fs.target. Dec 13 14:34:41.900656 systemd[1]: Reached target machines.target. Dec 13 14:34:41.901732 systemd[1]: Starting ldconfig.service... Dec 13 14:34:41.914937 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:34:41.914968 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:34:41.915870 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:34:41.916633 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:34:41.917710 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:34:41.918707 systemd[1]: Starting systemd-sysext.service... Dec 13 14:34:41.941019 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1092 (bootctl) Dec 13 14:34:41.941802 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:34:41.965431 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:34:41.977554 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:34:41.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:41.988262 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:34:41.988385 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:34:42.018583 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 14:34:42.048821 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:34:42.049246 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:34:42.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.095582 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:34:42.131577 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 14:34:42.253092 (sd-sysext)[1104]: Using extensions 'kubernetes'. Dec 13 14:34:42.253983 (sd-sysext)[1104]: Merged extensions into '/usr'. Dec 13 14:34:42.265409 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:42.266496 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:34:42.268806 systemd-fsck[1101]: fsck.fat 4.2 (2021-01-31) Dec 13 14:34:42.268806 systemd-fsck[1101]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 14:34:42.269371 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:34:42.270113 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:34:42.270795 systemd[1]: Starting modprobe@loop.service... Dec 13 14:34:42.270922 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.271000 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:34:42.271081 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:42.274670 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:34:42.275609 kernel: kauditd_printk_skb: 193 callbacks suppressed Dec 13 14:34:42.275648 kernel: audit: type=1130 audit(1734100482.273:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.273000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.274748 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:34:42.275041 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:34:42.275107 systemd[1]: Finished modprobe@loop.service. Dec 13 14:34:42.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.281168 kernel: audit: type=1131 audit(1734100482.273:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.281882 kernel: audit: type=1130 audit(1734100482.280:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.281874 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:34:42.285625 kernel: audit: type=1131 audit(1734100482.280:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.284824 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:34:42.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.287840 systemd[1]: Finished systemd-sysext.service. Dec 13 14:34:42.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.290956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:34:42.291044 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:34:42.293581 kernel: audit: type=1130 audit(1734100482.286:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.293620 kernel: audit: type=1130 audit(1734100482.289:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.295393 systemd[1]: Mounting boot.mount... Dec 13 14:34:42.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.296579 kernel: audit: type=1130 audit(1734100482.292:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.296608 kernel: audit: type=1131 audit(1734100482.292:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.301243 systemd[1]: Starting ensure-sysext.service... Dec 13 14:34:42.301369 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:34:42.301414 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.302202 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:34:42.307745 systemd[1]: Reloading. Dec 13 14:34:42.316178 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:34:42.323120 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:34:42.341158 systemd-tmpfiles[1112]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:34:42.350215 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2024-12-13T14:34:42Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:34:42.350230 /usr/lib/systemd/system-generators/torcx-generator[1131]: time="2024-12-13T14:34:42Z" level=info msg="torcx already run" Dec 13 14:34:42.404336 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:34:42.404349 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:34:42.416411 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:34:42.455000 audit: BPF prog-id=27 op=LOAD Dec 13 14:34:42.456000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:34:42.458958 kernel: audit: type=1334 audit(1734100482.455:165): prog-id=27 op=LOAD Dec 13 14:34:42.459007 kernel: audit: type=1334 audit(1734100482.456:166): prog-id=18 op=UNLOAD Dec 13 14:34:42.457000 audit: BPF prog-id=28 op=LOAD Dec 13 14:34:42.457000 audit: BPF prog-id=29 op=LOAD Dec 13 14:34:42.457000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:34:42.457000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:34:42.459000 audit: BPF prog-id=30 op=LOAD Dec 13 14:34:42.459000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:34:42.459000 audit: BPF prog-id=31 op=LOAD Dec 13 14:34:42.459000 audit: BPF prog-id=32 op=LOAD Dec 13 14:34:42.459000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:34:42.459000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:34:42.460000 audit: BPF prog-id=33 op=LOAD Dec 13 14:34:42.460000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:34:42.460000 audit: BPF prog-id=34 op=LOAD Dec 13 14:34:42.460000 audit: BPF prog-id=35 op=LOAD Dec 13 14:34:42.460000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:34:42.460000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:34:42.464314 systemd[1]: Mounted boot.mount. Dec 13 14:34:42.471840 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:34:42.473082 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:34:42.474030 systemd[1]: Starting modprobe@loop.service... Dec 13 14:34:42.474263 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.474329 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:34:42.475322 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:34:42.475403 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:34:42.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.475921 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:34:42.476049 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:34:42.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.476528 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:34:42.476662 systemd[1]: Finished modprobe@loop.service. Dec 13 14:34:42.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.477421 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:34:42.477544 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.479135 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:34:42.480448 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:34:42.481883 systemd[1]: Starting modprobe@loop.service... Dec 13 14:34:42.482052 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.482125 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:34:42.482728 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:34:42.482807 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:34:42.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.483306 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:34:42.483379 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:34:42.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.484167 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:34:42.484291 systemd[1]: Finished modprobe@loop.service. Dec 13 14:34:42.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.482000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.484792 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:34:42.484925 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.487200 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:34:42.488484 systemd[1]: Starting modprobe@drm.service... Dec 13 14:34:42.489755 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:34:42.490636 systemd[1]: Starting modprobe@loop.service... Dec 13 14:34:42.490857 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.490935 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:34:42.491956 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:34:42.492893 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:34:42.492989 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:34:42.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.491000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.493518 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:34:42.493769 systemd[1]: Finished modprobe@drm.service. Dec 13 14:34:42.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.494246 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:34:42.494314 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:34:42.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.494848 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:34:42.494925 systemd[1]: Finished modprobe@loop.service. Dec 13 14:34:42.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.495624 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:34:42.495677 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:34:42.496377 systemd[1]: Finished ensure-sysext.service. Dec 13 14:34:42.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.522863 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:34:42.521000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.634597 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:42.634616 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 14:34:42.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.722325 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:34:42.723632 systemd[1]: Starting audit-rules.service... Dec 13 14:34:42.724687 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:34:42.725000 audit: BPF prog-id=36 op=LOAD Dec 13 14:34:42.725736 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:34:42.727134 systemd[1]: Starting systemd-resolved.service... Dec 13 14:34:42.726000 audit: BPF prog-id=37 op=LOAD Dec 13 14:34:42.728697 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:34:42.730721 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:34:42.741000 audit[1208]: SYSTEM_BOOT pid=1208 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.743971 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:34:42.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.756383 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:34:42.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.756522 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:34:42.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.790384 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:34:42.790544 systemd[1]: Reached target time-set.target. Dec 13 14:34:42.815273 systemd-resolved[1206]: Positive Trust Anchors: Dec 13 14:34:42.815704 systemd-resolved[1206]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:34:42.815794 systemd-resolved[1206]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:34:42.835348 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:34:42.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:34:42.845142 systemd-resolved[1206]: Defaulting to hostname 'linux'. Dec 13 14:34:42.845000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:34:42.845000 audit[1224]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fffc29e88a0 a2=420 a3=0 items=0 ppid=1203 pid=1224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:34:42.845000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:34:42.846900 augenrules[1224]: No rules Dec 13 14:34:42.847143 systemd[1]: Started systemd-resolved.service. Dec 13 14:34:42.847310 systemd[1]: Reached target network.target. Dec 13 14:34:42.847412 systemd[1]: Reached target nss-lookup.target. Dec 13 14:34:42.847679 systemd[1]: Finished audit-rules.service. Dec 13 14:34:42.863731 systemd-networkd[1063]: ens192: Gained IPv6LL Dec 13 14:34:42.864709 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:34:42.864890 systemd[1]: Reached target network-online.target. Dec 13 14:35:52.814179 systemd-resolved[1206]: Clock change detected. Flushing caches. Dec 13 14:35:52.814267 systemd-timesyncd[1207]: Contacted time server 67.217.246.204:123 (0.flatcar.pool.ntp.org). Dec 13 14:35:52.814352 systemd-timesyncd[1207]: Initial clock synchronization to Fri 2024-12-13 14:35:52.814099 UTC. Dec 13 14:35:52.885021 ldconfig[1091]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:35:52.887809 systemd[1]: Finished ldconfig.service. Dec 13 14:35:52.888991 systemd[1]: Starting systemd-update-done.service... Dec 13 14:35:52.893703 systemd[1]: Finished systemd-update-done.service. Dec 13 14:35:52.893883 systemd[1]: Reached target sysinit.target. Dec 13 14:35:52.894041 systemd[1]: Started motdgen.path. Dec 13 14:35:52.894153 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:35:52.894354 systemd[1]: Started logrotate.timer. Dec 13 14:35:52.894520 systemd[1]: Started mdadm.timer. Dec 13 14:35:52.894614 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:35:52.894720 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:35:52.894753 systemd[1]: Reached target paths.target. Dec 13 14:35:52.894848 systemd[1]: Reached target timers.target. Dec 13 14:35:52.895109 systemd[1]: Listening on dbus.socket. Dec 13 14:35:52.896006 systemd[1]: Starting docker.socket... Dec 13 14:35:52.903711 systemd[1]: Listening on sshd.socket. Dec 13 14:35:52.903888 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:52.904163 systemd[1]: Listening on docker.socket. Dec 13 14:35:52.904311 systemd[1]: Reached target sockets.target. Dec 13 14:35:52.904408 systemd[1]: Reached target basic.target. Dec 13 14:35:52.904524 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:35:52.904543 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:35:52.905285 systemd[1]: Starting containerd.service... Dec 13 14:35:52.906134 systemd[1]: Starting dbus.service... Dec 13 14:35:52.907490 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:35:52.908318 systemd[1]: Starting extend-filesystems.service... Dec 13 14:35:52.908947 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:35:52.909858 jq[1234]: false Dec 13 14:35:52.913824 systemd[1]: Starting kubelet.service... Dec 13 14:35:52.914992 systemd[1]: Starting motdgen.service... Dec 13 14:35:52.921551 systemd[1]: Starting prepare-helm.service... Dec 13 14:35:52.922511 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:35:52.923620 systemd[1]: Starting sshd-keygen.service... Dec 13 14:35:52.925882 systemd[1]: Starting systemd-logind.service... Dec 13 14:35:52.925996 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:35:52.926041 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:35:52.926434 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:35:52.926737 systemd[1]: Starting update-engine.service... Dec 13 14:35:52.927554 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:35:52.928640 systemd[1]: Starting vmtoolsd.service... Dec 13 14:35:52.931589 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:35:52.931767 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:35:52.936206 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:35:52.939819 jq[1245]: true Dec 13 14:35:52.936370 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:35:52.944048 jq[1255]: true Dec 13 14:35:52.950771 extend-filesystems[1235]: Found loop1 Dec 13 14:35:52.950771 extend-filesystems[1235]: Found sda Dec 13 14:35:52.950771 extend-filesystems[1235]: Found sda1 Dec 13 14:35:52.950771 extend-filesystems[1235]: Found sda2 Dec 13 14:35:52.950771 extend-filesystems[1235]: Found sda3 Dec 13 14:35:52.952212 extend-filesystems[1235]: Found usr Dec 13 14:35:52.952212 extend-filesystems[1235]: Found sda4 Dec 13 14:35:52.952212 extend-filesystems[1235]: Found sda6 Dec 13 14:35:52.952212 extend-filesystems[1235]: Found sda7 Dec 13 14:35:52.952212 extend-filesystems[1235]: Found sda9 Dec 13 14:35:52.952212 extend-filesystems[1235]: Checking size of /dev/sda9 Dec 13 14:35:52.958672 systemd[1]: Started vmtoolsd.service. Dec 13 14:35:52.960597 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:35:52.960709 systemd[1]: Finished motdgen.service. Dec 13 14:35:52.996120 env[1267]: time="2024-12-13T14:35:52.996091903Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:35:53.004321 tar[1250]: linux-amd64/helm Dec 13 14:35:53.007125 extend-filesystems[1235]: Old size kept for /dev/sda9 Dec 13 14:35:53.007125 extend-filesystems[1235]: Found sr0 Dec 13 14:35:53.007448 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:35:53.007556 systemd[1]: Finished extend-filesystems.service. Dec 13 14:35:53.019641 systemd-logind[1243]: Watching system buttons on /dev/input/event1 (Power Button) Dec 13 14:35:53.019654 systemd-logind[1243]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 14:35:53.020893 systemd-logind[1243]: New seat seat0. Dec 13 14:35:53.038298 env[1267]: time="2024-12-13T14:35:53.038259815Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:35:53.053009 env[1267]: time="2024-12-13T14:35:53.052809689Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055635068Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055656918Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055793259Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055804680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055818709Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055824633Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.056509 env[1267]: time="2024-12-13T14:35:53.055874494Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.057575 bash[1278]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:35:53.057967 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:35:53.059013 env[1267]: time="2024-12-13T14:35:53.058794240Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:35:53.060586 env[1267]: time="2024-12-13T14:35:53.060568834Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:35:53.060586 env[1267]: time="2024-12-13T14:35:53.060583286Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:35:53.060660 env[1267]: time="2024-12-13T14:35:53.060635726Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:35:53.060660 env[1267]: time="2024-12-13T14:35:53.060646261Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071864724Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071890715Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071900099Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071957981Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071968881Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071976484Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071983363Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.071990924Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072007453Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072017587Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072030919Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072039732Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072122866Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:35:53.072457 env[1267]: time="2024-12-13T14:35:53.072183744Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072335538Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072354731Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072363054Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072400381Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072410156Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072416884Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072422869Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072429508Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.072859 env[1267]: time="2024-12-13T14:35:53.072436271Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.072447085Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.072890336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.072901184Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.072987562Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.072997570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073004320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073010735Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073019213Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073042838Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073055798Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:35:53.073928 env[1267]: time="2024-12-13T14:35:53.073078739Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:35:53.074173 env[1267]: time="2024-12-13T14:35:53.073220738Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:35:53.074173 env[1267]: time="2024-12-13T14:35:53.073255083Z" level=info msg="Connect containerd service" Dec 13 14:35:53.074173 env[1267]: time="2024-12-13T14:35:53.073448228Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.075345158Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.075680527Z" level=info msg="Start subscribing containerd event" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.075907928Z" level=info msg="Start recovering state" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.075971544Z" level=info msg="Start event monitor" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.076095751Z" level=info msg="Start snapshots syncer" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.076109968Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.076114933Z" level=info msg="Start streaming server" Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.076962049Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.076995607Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:35:53.079907 env[1267]: time="2024-12-13T14:35:53.077522172Z" level=info msg="containerd successfully booted in 0.087396s" Dec 13 14:35:53.077572 systemd[1]: Started containerd.service. Dec 13 14:35:53.081650 dbus-daemon[1233]: [system] SELinux support is enabled Dec 13 14:35:53.082222 systemd[1]: Started dbus.service. Dec 13 14:35:53.083592 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:35:53.083609 systemd[1]: Reached target system-config.target. Dec 13 14:35:53.083750 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:35:53.083768 systemd[1]: Reached target user-config.target. Dec 13 14:35:53.085865 systemd[1]: Started systemd-logind.service. Dec 13 14:35:53.095906 update_engine[1244]: I1213 14:35:53.093628 1244 main.cc:92] Flatcar Update Engine starting Dec 13 14:35:53.100781 kernel: NET: Registered PF_VSOCK protocol family Dec 13 14:35:53.103464 systemd[1]: Started update-engine.service. Dec 13 14:35:53.105112 systemd[1]: Started locksmithd.service. Dec 13 14:35:53.105983 update_engine[1244]: I1213 14:35:53.105964 1244 update_check_scheduler.cc:74] Next update check in 7m2s Dec 13 14:35:53.403342 tar[1250]: linux-amd64/LICENSE Dec 13 14:35:53.403473 tar[1250]: linux-amd64/README.md Dec 13 14:35:53.406521 systemd[1]: Finished prepare-helm.service. Dec 13 14:35:53.603087 locksmithd[1298]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:35:53.715276 sshd_keygen[1256]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:35:53.728582 systemd[1]: Finished sshd-keygen.service. Dec 13 14:35:53.729712 systemd[1]: Starting issuegen.service... Dec 13 14:35:53.732874 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:35:53.732956 systemd[1]: Finished issuegen.service. Dec 13 14:35:53.733977 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:35:53.742321 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:35:53.743257 systemd[1]: Started getty@tty1.service. Dec 13 14:35:53.744060 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 14:35:53.744257 systemd[1]: Reached target getty.target. Dec 13 14:35:55.003254 systemd[1]: Started kubelet.service. Dec 13 14:35:55.003704 systemd[1]: Reached target multi-user.target. Dec 13 14:35:55.005002 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:35:55.011834 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:35:55.011971 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:35:55.012216 systemd[1]: Startup finished in 877ms (kernel) + 4.331s (initrd) + 8.326s (userspace) = 13.535s. Dec 13 14:35:55.066627 login[1362]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:35:55.068123 login[1363]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:35:55.126011 systemd[1]: Created slice user-500.slice. Dec 13 14:35:55.127079 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:35:55.129029 systemd-logind[1243]: New session 1 of user core. Dec 13 14:35:55.131385 systemd-logind[1243]: New session 2 of user core. Dec 13 14:35:55.139969 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:35:55.142632 systemd[1]: Starting user@500.service... Dec 13 14:35:55.144835 (systemd)[1369]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:35:55.226519 systemd[1369]: Queued start job for default target default.target. Dec 13 14:35:55.227145 systemd[1369]: Reached target paths.target. Dec 13 14:35:55.227162 systemd[1369]: Reached target sockets.target. Dec 13 14:35:55.227170 systemd[1369]: Reached target timers.target. Dec 13 14:35:55.227178 systemd[1369]: Reached target basic.target. Dec 13 14:35:55.227236 systemd[1]: Started user@500.service. Dec 13 14:35:55.227912 systemd[1369]: Reached target default.target. Dec 13 14:35:55.227946 systemd[1369]: Startup finished in 78ms. Dec 13 14:35:55.228004 systemd[1]: Started session-1.scope. Dec 13 14:35:55.228532 systemd[1]: Started session-2.scope. Dec 13 14:35:56.425481 kubelet[1366]: E1213 14:35:56.425445 1366 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:35:56.426691 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:35:56.426795 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:06.677396 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:36:06.677569 systemd[1]: Stopped kubelet.service. Dec 13 14:36:06.678803 systemd[1]: Starting kubelet.service... Dec 13 14:36:06.980619 systemd[1]: Started kubelet.service. Dec 13 14:36:07.052514 kubelet[1398]: E1213 14:36:07.052490 1398 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:07.054487 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:07.054557 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:17.305169 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:36:17.305325 systemd[1]: Stopped kubelet.service. Dec 13 14:36:17.306566 systemd[1]: Starting kubelet.service... Dec 13 14:36:17.528079 systemd[1]: Started kubelet.service. Dec 13 14:36:17.578099 kubelet[1407]: E1213 14:36:17.578024 1407 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:17.579494 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:17.579574 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:27.704602 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:36:27.704771 systemd[1]: Stopped kubelet.service. Dec 13 14:36:27.705843 systemd[1]: Starting kubelet.service... Dec 13 14:36:28.029815 systemd[1]: Started kubelet.service. Dec 13 14:36:28.058058 kubelet[1416]: E1213 14:36:28.058026 1416 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:28.059050 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:28.059119 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:33.272981 systemd[1]: Created slice system-sshd.slice. Dec 13 14:36:33.274035 systemd[1]: Started sshd@0-139.178.70.110:22-147.75.109.163:45718.service. Dec 13 14:36:33.343042 sshd[1422]: Accepted publickey for core from 147.75.109.163 port 45718 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.343831 sshd[1422]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.347109 systemd[1]: Started session-3.scope. Dec 13 14:36:33.347419 systemd-logind[1243]: New session 3 of user core. Dec 13 14:36:33.394989 systemd[1]: Started sshd@1-139.178.70.110:22-147.75.109.163:45726.service. Dec 13 14:36:33.425109 sshd[1427]: Accepted publickey for core from 147.75.109.163 port 45726 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.426171 sshd[1427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.429099 systemd-logind[1243]: New session 4 of user core. Dec 13 14:36:33.429499 systemd[1]: Started session-4.scope. Dec 13 14:36:33.480031 sshd[1427]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.481773 systemd[1]: Started sshd@2-139.178.70.110:22-147.75.109.163:45738.service. Dec 13 14:36:33.483814 systemd-logind[1243]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:36:33.483938 systemd[1]: sshd@1-139.178.70.110:22-147.75.109.163:45726.service: Deactivated successfully. Dec 13 14:36:33.484329 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:36:33.486052 systemd-logind[1243]: Removed session 4. Dec 13 14:36:33.510926 sshd[1432]: Accepted publickey for core from 147.75.109.163 port 45738 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.511979 sshd[1432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.515452 systemd[1]: Started session-5.scope. Dec 13 14:36:33.515719 systemd-logind[1243]: New session 5 of user core. Dec 13 14:36:33.563820 sshd[1432]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.566496 systemd[1]: Started sshd@3-139.178.70.110:22-147.75.109.163:45752.service. Dec 13 14:36:33.567163 systemd[1]: sshd@2-139.178.70.110:22-147.75.109.163:45738.service: Deactivated successfully. Dec 13 14:36:33.567672 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:36:33.568908 systemd-logind[1243]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:36:33.569699 systemd-logind[1243]: Removed session 5. Dec 13 14:36:33.597979 sshd[1438]: Accepted publickey for core from 147.75.109.163 port 45752 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.599100 sshd[1438]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.602677 systemd[1]: Started session-6.scope. Dec 13 14:36:33.603008 systemd-logind[1243]: New session 6 of user core. Dec 13 14:36:33.653482 sshd[1438]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.655976 systemd[1]: Started sshd@4-139.178.70.110:22-147.75.109.163:45754.service. Dec 13 14:36:33.656269 systemd[1]: sshd@3-139.178.70.110:22-147.75.109.163:45752.service: Deactivated successfully. Dec 13 14:36:33.656661 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:36:33.657148 systemd-logind[1243]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:36:33.657881 systemd-logind[1243]: Removed session 6. Dec 13 14:36:33.685151 sshd[1444]: Accepted publickey for core from 147.75.109.163 port 45754 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.685897 sshd[1444]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.688390 systemd-logind[1243]: New session 7 of user core. Dec 13 14:36:33.688825 systemd[1]: Started session-7.scope. Dec 13 14:36:33.835105 sudo[1448]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:36:33.835291 sudo[1448]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:33.843027 dbus-daemon[1233]: Ѝ\xbf\u0006\x8fU: received setenforce notice (enforcing=-137966496) Dec 13 14:36:33.843144 sudo[1448]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:33.845715 sshd[1444]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.848195 systemd[1]: Started sshd@5-139.178.70.110:22-147.75.109.163:45768.service. Dec 13 14:36:33.849042 systemd[1]: sshd@4-139.178.70.110:22-147.75.109.163:45754.service: Deactivated successfully. Dec 13 14:36:33.849559 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:36:33.850263 systemd-logind[1243]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:36:33.851119 systemd-logind[1243]: Removed session 7. Dec 13 14:36:33.880885 sshd[1451]: Accepted publickey for core from 147.75.109.163 port 45768 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:33.881799 sshd[1451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:33.884653 systemd[1]: Started session-8.scope. Dec 13 14:36:33.885513 systemd-logind[1243]: New session 8 of user core. Dec 13 14:36:33.933832 sudo[1456]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:36:33.934168 sudo[1456]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:33.935877 sudo[1456]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:33.938675 sudo[1455]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:36:33.938819 sudo[1455]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:33.944036 systemd[1]: Stopping audit-rules.service... Dec 13 14:36:33.947766 kernel: kauditd_printk_skb: 49 callbacks suppressed Dec 13 14:36:33.947810 kernel: audit: type=1305 audit(1734100593.944:214): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:33.944000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:36:33.944000 audit[1459]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff748f3d20 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:33.949821 auditctl[1459]: No rules Dec 13 14:36:33.952402 kernel: audit: type=1300 audit(1734100593.944:214): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7fff748f3d20 a2=420 a3=0 items=0 ppid=1 pid=1459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:33.950071 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:36:33.950162 systemd[1]: Stopped audit-rules.service. Dec 13 14:36:33.952247 systemd[1]: Starting audit-rules.service... Dec 13 14:36:33.944000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:33.957378 kernel: audit: type=1327 audit(1734100593.944:214): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:36:33.957404 kernel: audit: type=1131 audit(1734100593.949:215): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.963678 augenrules[1476]: No rules Dec 13 14:36:33.964656 sudo[1455]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:33.964158 systemd[1]: Finished audit-rules.service. Dec 13 14:36:33.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.963000 audit[1455]: USER_END pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.970365 kernel: audit: type=1130 audit(1734100593.963:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.970395 kernel: audit: type=1106 audit(1734100593.963:217): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.970566 sshd[1451]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:33.963000 audit[1455]: CRED_DISP pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.973098 systemd[1]: Started sshd@6-139.178.70.110:22-147.75.109.163:45784.service. Dec 13 14:36:33.973780 kernel: audit: type=1104 audit(1734100593.963:218): pid=1455 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.975433 systemd[1]: sshd@5-139.178.70.110:22-147.75.109.163:45768.service: Deactivated successfully. Dec 13 14:36:33.975767 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:36:33.977756 kernel: audit: type=1130 audit(1734100593.972:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.977926 systemd-logind[1243]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:36:33.973000 audit[1451]: USER_END pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:33.981808 kernel: audit: type=1106 audit(1734100593.973:220): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:33.981891 kernel: audit: type=1104 audit(1734100593.974:221): pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:33.974000 audit[1451]: CRED_DISP pid=1451 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:33.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-139.178.70.110:22-147.75.109.163:45768 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:33.984791 systemd-logind[1243]: Removed session 8. Dec 13 14:36:34.005000 audit[1481]: USER_ACCT pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:34.006502 sshd[1481]: Accepted publickey for core from 147.75.109.163 port 45784 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:36:34.006000 audit[1481]: CRED_ACQ pid=1481 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:34.006000 audit[1481]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd44dfea20 a2=3 a3=0 items=0 ppid=1 pid=1481 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.006000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:36:34.007823 sshd[1481]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:36:34.011473 systemd[1]: Started session-9.scope. Dec 13 14:36:34.011818 systemd-logind[1243]: New session 9 of user core. Dec 13 14:36:34.014000 audit[1481]: USER_START pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:34.015000 audit[1484]: CRED_ACQ pid=1484 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:34.060000 audit[1485]: USER_ACCT pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.060000 audit[1485]: CRED_REFR pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.061486 sudo[1485]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:36:34.061659 sudo[1485]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:36:34.062000 audit[1485]: USER_START pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.083234 systemd[1]: Starting docker.service... Dec 13 14:36:34.105501 env[1495]: time="2024-12-13T14:36:34.105410832Z" level=info msg="Starting up" Dec 13 14:36:34.107778 env[1495]: time="2024-12-13T14:36:34.107766446Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:36:34.107830 env[1495]: time="2024-12-13T14:36:34.107820028Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:36:34.107885 env[1495]: time="2024-12-13T14:36:34.107874209Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:36:34.107930 env[1495]: time="2024-12-13T14:36:34.107921037Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:36:34.108847 env[1495]: time="2024-12-13T14:36:34.108836393Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:36:34.108894 env[1495]: time="2024-12-13T14:36:34.108884678Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:36:34.108939 env[1495]: time="2024-12-13T14:36:34.108929087Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:36:34.108979 env[1495]: time="2024-12-13T14:36:34.108970613Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:36:34.125967 env[1495]: time="2024-12-13T14:36:34.125949754Z" level=info msg="Loading containers: start." Dec 13 14:36:34.165000 audit[1525]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1525 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.165000 audit[1525]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd819d0a10 a2=0 a3=7ffd819d09fc items=0 ppid=1495 pid=1525 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.165000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:36:34.166000 audit[1527]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1527 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.166000 audit[1527]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc438a9e10 a2=0 a3=7ffc438a9dfc items=0 ppid=1495 pid=1527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.166000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:36:34.167000 audit[1529]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1529 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.167000 audit[1529]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffccf512c10 a2=0 a3=7ffccf512bfc items=0 ppid=1495 pid=1529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:36:34.169000 audit[1531]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1531 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.169000 audit[1531]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd163b3910 a2=0 a3=7ffd163b38fc items=0 ppid=1495 pid=1531 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:36:34.176000 audit[1533]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.176000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc42af3120 a2=0 a3=7ffc42af310c items=0 ppid=1495 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.176000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:36:34.197000 audit[1538]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1538 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.197000 audit[1538]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe93d28750 a2=0 a3=7ffe93d2873c items=0 ppid=1495 pid=1538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:36:34.213000 audit[1540]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1540 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.213000 audit[1540]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff7d05a40 a2=0 a3=7ffff7d05a2c items=0 ppid=1495 pid=1540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:36:34.215000 audit[1542]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1542 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.215000 audit[1542]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffe7a1210c0 a2=0 a3=7ffe7a1210ac items=0 ppid=1495 pid=1542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.215000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:36:34.216000 audit[1544]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.216000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe31b0fbe0 a2=0 a3=7ffe31b0fbcc items=0 ppid=1495 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.216000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:34.233000 audit[1548]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1548 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.233000 audit[1548]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffecab36250 a2=0 a3=7ffecab3623c items=0 ppid=1495 pid=1548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:34.238000 audit[1549]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1549 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.238000 audit[1549]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd40008020 a2=0 a3=7ffd4000800c items=0 ppid=1495 pid=1549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.238000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:34.260769 kernel: Initializing XFRM netlink socket Dec 13 14:36:34.293782 env[1495]: time="2024-12-13T14:36:34.293758479Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:36:34.307000 audit[1557]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1557 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.307000 audit[1557]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffce8ae1360 a2=0 a3=7ffce8ae134c items=0 ppid=1495 pid=1557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.307000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:36:34.315000 audit[1560]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1560 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.315000 audit[1560]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffcd9e9a660 a2=0 a3=7ffcd9e9a64c items=0 ppid=1495 pid=1560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:36:34.317000 audit[1563]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1563 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.317000 audit[1563]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd8766acf0 a2=0 a3=7ffd8766acdc items=0 ppid=1495 pid=1563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:36:34.318000 audit[1565]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1565 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.318000 audit[1565]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc0c002300 a2=0 a3=7ffc0c0022ec items=0 ppid=1495 pid=1565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:36:34.320000 audit[1567]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1567 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.320000 audit[1567]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffc9e385400 a2=0 a3=7ffc9e3853ec items=0 ppid=1495 pid=1567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.320000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:36:34.321000 audit[1569]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1569 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.321000 audit[1569]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd2e576290 a2=0 a3=7ffd2e57627c items=0 ppid=1495 pid=1569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.321000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:36:34.322000 audit[1571]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1571 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.322000 audit[1571]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc842a0b00 a2=0 a3=7ffc842a0aec items=0 ppid=1495 pid=1571 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:36:34.328000 audit[1574]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1574 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.328000 audit[1574]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdb4929a40 a2=0 a3=7ffdb4929a2c items=0 ppid=1495 pid=1574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.328000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:36:34.329000 audit[1576]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1576 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.329000 audit[1576]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe5c2b3b00 a2=0 a3=7ffe5c2b3aec items=0 ppid=1495 pid=1576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:36:34.330000 audit[1578]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1578 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.330000 audit[1578]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe68ffc140 a2=0 a3=7ffe68ffc12c items=0 ppid=1495 pid=1578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:36:34.331000 audit[1580]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1580 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.331000 audit[1580]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf2712690 a2=0 a3=7ffcf271267c items=0 ppid=1495 pid=1580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.331000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:36:34.333016 systemd-networkd[1063]: docker0: Link UP Dec 13 14:36:34.336000 audit[1584]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1584 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.336000 audit[1584]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3755a7f0 a2=0 a3=7ffc3755a7dc items=0 ppid=1495 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:34.340000 audit[1585]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1585 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:34.340000 audit[1585]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcab400230 a2=0 a3=7ffcab40021c items=0 ppid=1495 pid=1585 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:34.340000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:36:34.341471 env[1495]: time="2024-12-13T14:36:34.341458519Z" level=info msg="Loading containers: done." Dec 13 14:36:34.347426 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3554749564-merged.mount: Deactivated successfully. Dec 13 14:36:34.390045 env[1495]: time="2024-12-13T14:36:34.389993909Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:36:34.390271 env[1495]: time="2024-12-13T14:36:34.390245676Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:36:34.390418 env[1495]: time="2024-12-13T14:36:34.390402939Z" level=info msg="Daemon has completed initialization" Dec 13 14:36:34.428245 systemd[1]: Started docker.service. Dec 13 14:36:34.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:34.429425 env[1495]: time="2024-12-13T14:36:34.429389128Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:36:35.239081 env[1267]: time="2024-12-13T14:36:35.239052258Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:36:35.897687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount578132871.mount: Deactivated successfully. Dec 13 14:36:36.943047 env[1267]: time="2024-12-13T14:36:36.943019006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.943805 env[1267]: time="2024-12-13T14:36:36.943792954Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.944762 env[1267]: time="2024-12-13T14:36:36.944738017Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.945692 env[1267]: time="2024-12-13T14:36:36.945679382Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:36.946176 env[1267]: time="2024-12-13T14:36:36.946162213Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 14:36:36.947440 env[1267]: time="2024-12-13T14:36:36.947423474Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:36:38.202000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:38.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:38.204594 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:36:38.204725 systemd[1]: Stopped kubelet.service. Dec 13 14:36:38.205730 systemd[1]: Starting kubelet.service... Dec 13 14:36:38.207503 env[1267]: time="2024-12-13T14:36:38.206602199Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:38.207503 env[1267]: time="2024-12-13T14:36:38.207416398Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 14:36:38.208672 env[1267]: time="2024-12-13T14:36:38.208000315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:38.208672 env[1267]: time="2024-12-13T14:36:38.208415388Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:38.209470 env[1267]: time="2024-12-13T14:36:38.208851145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:38.211968 env[1267]: time="2024-12-13T14:36:38.211952495Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:36:38.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:38.254704 systemd[1]: Started kubelet.service. Dec 13 14:36:38.298142 kubelet[1622]: E1213 14:36:38.298110 1622 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:36:38.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:36:38.299125 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:36:38.299195 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:36:38.481256 update_engine[1244]: I1213 14:36:38.480784 1244 update_attempter.cc:509] Updating boot flags... Dec 13 14:36:39.610304 env[1267]: time="2024-12-13T14:36:39.610275583Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.626968 env[1267]: time="2024-12-13T14:36:39.626949929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.632060 env[1267]: time="2024-12-13T14:36:39.632047051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.643667 env[1267]: time="2024-12-13T14:36:39.643655184Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:39.644086 env[1267]: time="2024-12-13T14:36:39.644068628Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 14:36:39.644421 env[1267]: time="2024-12-13T14:36:39.644404082Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:36:40.652655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3659333795.mount: Deactivated successfully. Dec 13 14:36:41.076996 env[1267]: time="2024-12-13T14:36:41.076934735Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:41.077646 env[1267]: time="2024-12-13T14:36:41.077629756Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:41.078275 env[1267]: time="2024-12-13T14:36:41.078261987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:41.078905 env[1267]: time="2024-12-13T14:36:41.078890612Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:41.079250 env[1267]: time="2024-12-13T14:36:41.079224623Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 14:36:41.079905 env[1267]: time="2024-12-13T14:36:41.079887205Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:36:41.606201 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1969259818.mount: Deactivated successfully. Dec 13 14:36:42.531982 env[1267]: time="2024-12-13T14:36:42.531948595Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:42.533155 env[1267]: time="2024-12-13T14:36:42.533118153Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:42.534614 env[1267]: time="2024-12-13T14:36:42.534597061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:42.536199 env[1267]: time="2024-12-13T14:36:42.536177223Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:42.536947 env[1267]: time="2024-12-13T14:36:42.536923676Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 14:36:42.537304 env[1267]: time="2024-12-13T14:36:42.537286403Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:36:42.994760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4223017916.mount: Deactivated successfully. Dec 13 14:36:43.039189 env[1267]: time="2024-12-13T14:36:43.039151359Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:43.055931 env[1267]: time="2024-12-13T14:36:43.055902682Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:43.063716 env[1267]: time="2024-12-13T14:36:43.063697913Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:43.069761 env[1267]: time="2024-12-13T14:36:43.069731627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:43.070156 env[1267]: time="2024-12-13T14:36:43.070133546Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 14:36:43.070628 env[1267]: time="2024-12-13T14:36:43.070611887Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:36:43.580304 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount143091939.mount: Deactivated successfully. Dec 13 14:36:45.409721 env[1267]: time="2024-12-13T14:36:45.409687664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:45.410588 env[1267]: time="2024-12-13T14:36:45.410574978Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:45.411658 env[1267]: time="2024-12-13T14:36:45.411646225Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:45.412727 env[1267]: time="2024-12-13T14:36:45.412710504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:45.413266 env[1267]: time="2024-12-13T14:36:45.413249425Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 14:36:47.729005 systemd[1]: Stopped kubelet.service. Dec 13 14:36:47.733767 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:36:47.733816 kernel: audit: type=1130 audit(1734100607.727:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:47.733836 kernel: audit: type=1131 audit(1734100607.727:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:47.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:47.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:47.732932 systemd[1]: Starting kubelet.service... Dec 13 14:36:47.756640 systemd[1]: Reloading. Dec 13 14:36:47.827682 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2024-12-13T14:36:47Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:47.827979 /usr/lib/systemd/system-generators/torcx-generator[1687]: time="2024-12-13T14:36:47Z" level=info msg="torcx already run" Dec 13 14:36:47.883585 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:47.883710 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:47.896170 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.945354 kernel: audit: type=1400 audit(1734100607.938:262): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.945397 kernel: audit: type=1400 audit(1734100607.938:263): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.945415 kernel: audit: type=1400 audit(1734100607.938:264): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.950096 kernel: audit: type=1400 audit(1734100607.938:265): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.953040 kernel: audit: type=1400 audit(1734100607.938:266): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.956578 kernel: audit: type=1400 audit(1734100607.938:267): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.956608 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:36:47.956625 kernel: audit: type=1400 audit(1734100607.938:268): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.945000 audit: BPF prog-id=43 op=LOAD Dec 13 14:36:47.946000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.946000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit: BPF prog-id=44 op=LOAD Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit: BPF prog-id=45 op=LOAD Dec 13 14:36:47.948000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:36:47.948000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit: BPF prog-id=46 op=LOAD Dec 13 14:36:47.951000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit: BPF prog-id=47 op=LOAD Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.951000 audit: BPF prog-id=48 op=LOAD Dec 13 14:36:47.951000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:36:47.951000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:36:47.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.952000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit: BPF prog-id=50 op=LOAD Dec 13 14:36:47.960000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit: BPF prog-id=51 op=LOAD Dec 13 14:36:47.961000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit: BPF prog-id=52 op=LOAD Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.961000 audit: BPF prog-id=53 op=LOAD Dec 13 14:36:47.961000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:36:47.962000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit: BPF prog-id=54 op=LOAD Dec 13 14:36:47.963000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit: BPF prog-id=55 op=LOAD Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.963000 audit: BPF prog-id=56 op=LOAD Dec 13 14:36:47.963000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:36:47.963000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:47.964000 audit: BPF prog-id=57 op=LOAD Dec 13 14:36:47.964000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:36:47.988868 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:36:47.988926 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:36:47.989091 systemd[1]: Stopped kubelet.service. Dec 13 14:36:47.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:36:47.990390 systemd[1]: Starting kubelet.service... Dec 13 14:36:48.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:48.283041 systemd[1]: Started kubelet.service. Dec 13 14:36:48.347145 kubelet[1751]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:48.347379 kubelet[1751]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:36:48.347437 kubelet[1751]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:48.357700 kubelet[1751]: I1213 14:36:48.357672 1751 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:36:48.677455 kubelet[1751]: I1213 14:36:48.677396 1751 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:36:48.677558 kubelet[1751]: I1213 14:36:48.677550 1751 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:36:48.677800 kubelet[1751]: I1213 14:36:48.677791 1751 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:36:48.703495 kubelet[1751]: I1213 14:36:48.703475 1751 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:48.707575 kubelet[1751]: E1213 14:36:48.707556 1751 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:48.712302 kubelet[1751]: E1213 14:36:48.712257 1751 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:36:48.712302 kubelet[1751]: I1213 14:36:48.712296 1751 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:36:48.715365 kubelet[1751]: I1213 14:36:48.715354 1751 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:36:48.715420 kubelet[1751]: I1213 14:36:48.715411 1751 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:36:48.715494 kubelet[1751]: I1213 14:36:48.715475 1751 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:36:48.715589 kubelet[1751]: I1213 14:36:48.715494 1751 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:36:48.715658 kubelet[1751]: I1213 14:36:48.715592 1751 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:36:48.715658 kubelet[1751]: I1213 14:36:48.715598 1751 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:36:48.715698 kubelet[1751]: I1213 14:36:48.715658 1751 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:48.718357 kubelet[1751]: W1213 14:36:48.718330 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:48.718432 kubelet[1751]: E1213 14:36:48.718421 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:48.718595 kubelet[1751]: I1213 14:36:48.718582 1751 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:36:48.718623 kubelet[1751]: I1213 14:36:48.718597 1751 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:36:48.718645 kubelet[1751]: I1213 14:36:48.718631 1751 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:36:48.718645 kubelet[1751]: I1213 14:36:48.718644 1751 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:36:48.728616 kubelet[1751]: W1213 14:36:48.728591 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.110:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:48.728666 kubelet[1751]: E1213 14:36:48.728619 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.110:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:48.730680 kubelet[1751]: I1213 14:36:48.730672 1751 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:36:48.731940 kubelet[1751]: I1213 14:36:48.731931 1751 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:36:48.732018 kubelet[1751]: W1213 14:36:48.732011 1751 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:36:48.733414 kubelet[1751]: I1213 14:36:48.733402 1751 server.go:1269] "Started kubelet" Dec 13 14:36:48.733837 kubelet[1751]: I1213 14:36:48.733818 1751 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:36:48.734771 kubelet[1751]: I1213 14:36:48.734752 1751 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:36:48.734000 audit[1751]: AVC avc: denied { mac_admin } for pid=1751 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:48.734000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:48.734000 audit[1751]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00098de60 a1=c0007ff338 a2=c00098de30 a3=25 items=0 ppid=1 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:48.734000 audit[1751]: AVC avc: denied { mac_admin } for pid=1751 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:48.734000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:48.734000 audit[1751]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009a90e0 a1=c0007ff350 a2=c00098def0 a3=25 items=0 ppid=1 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:48.737265 kubelet[1751]: I1213 14:36:48.736714 1751 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:36:48.737265 kubelet[1751]: I1213 14:36:48.736743 1751 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:36:48.737265 kubelet[1751]: I1213 14:36:48.736793 1751 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:36:48.738258 kubelet[1751]: I1213 14:36:48.738247 1751 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:36:48.738349 kubelet[1751]: I1213 14:36:48.738321 1751 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:36:48.738487 kubelet[1751]: I1213 14:36:48.738478 1751 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:36:48.737000 audit[1762]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1762 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.737000 audit[1762]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff5cae16b0 a2=0 a3=7fff5cae169c items=0 ppid=1751 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.737000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:48.740241 kubelet[1751]: I1213 14:36:48.740229 1751 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:36:48.740343 kubelet[1751]: E1213 14:36:48.740331 1751 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:36:48.738000 audit[1763]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.738000 audit[1763]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd4fc1ccf0 a2=0 a3=7ffd4fc1ccdc items=0 ppid=1751 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.740610 kubelet[1751]: I1213 14:36:48.740562 1751 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:36:48.740610 kubelet[1751]: I1213 14:36:48.740591 1751 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:36:48.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:36:48.741198 kubelet[1751]: W1213 14:36:48.741175 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:48.741236 kubelet[1751]: E1213 14:36:48.741204 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:48.741260 kubelet[1751]: E1213 14:36:48.741238 1751 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.110:6443: connect: connection refused" interval="200ms" Dec 13 14:36:48.741353 kubelet[1751]: I1213 14:36:48.741340 1751 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:36:48.741384 kubelet[1751]: I1213 14:36:48.741374 1751 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:36:48.742560 kubelet[1751]: E1213 14:36:48.741591 1751 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://139.178.70.110:6443/api/v1/namespaces/default/events\": dial tcp 139.178.70.110:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.1810c350e457a6d1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-12-13 14:36:48.733390545 +0000 UTC m=+0.447361471,LastTimestamp:2024-12-13 14:36:48.733390545 +0000 UTC m=+0.447361471,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Dec 13 14:36:48.743482 kubelet[1751]: I1213 14:36:48.743470 1751 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:36:48.744000 audit[1765]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.744000 audit[1765]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff6a05e120 a2=0 a3=7fff6a05e10c items=0 ppid=1751 pid=1765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.744000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:48.745000 audit[1767]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.745000 audit[1767]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeec5349f0 a2=0 a3=7ffeec5349dc items=0 ppid=1751 pid=1767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:36:48.753000 audit[1770]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.753000 audit[1770]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc3fd6b1d0 a2=0 a3=7ffc3fd6b1bc items=0 ppid=1751 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:36:48.754993 kubelet[1751]: I1213 14:36:48.754972 1751 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:36:48.753000 audit[1772]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:48.753000 audit[1772]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff0b021c30 a2=0 a3=7fff0b021c1c items=0 ppid=1751 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.753000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:36:48.755620 kubelet[1751]: I1213 14:36:48.755609 1751 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:36:48.755669 kubelet[1751]: I1213 14:36:48.755662 1751 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:36:48.755723 kubelet[1751]: I1213 14:36:48.755716 1751 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:36:48.755808 kubelet[1751]: E1213 14:36:48.755795 1751 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:36:48.754000 audit[1773]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1773 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.754000 audit[1773]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe77f97420 a2=0 a3=7ffe77f9740c items=0 ppid=1751 pid=1773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:48.755000 audit[1774]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.755000 audit[1774]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd26016fd0 a2=0 a3=7ffd26016fbc items=0 ppid=1751 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:48.755000 audit[1775]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1775 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:36:48.755000 audit[1775]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc7e0ffa50 a2=0 a3=7ffc7e0ffa3c items=0 ppid=1751 pid=1775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:48.756000 audit[1776]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:48.756000 audit[1776]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd84c8710 a2=0 a3=7fffd84c86fc items=0 ppid=1751 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:36:48.756000 audit[1777]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1777 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:48.756000 audit[1777]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffec02f1b0 a2=0 a3=7fffec02f19c items=0 ppid=1751 pid=1777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:36:48.757000 audit[1778]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:36:48.757000 audit[1778]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe646e5050 a2=0 a3=7ffe646e503c items=0 ppid=1751 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.757000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:36:48.760275 kubelet[1751]: W1213 14:36:48.760253 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:48.760349 kubelet[1751]: E1213 14:36:48.760337 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:48.765240 kubelet[1751]: E1213 14:36:48.765228 1751 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:36:48.767330 kubelet[1751]: I1213 14:36:48.767315 1751 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:36:48.767330 kubelet[1751]: I1213 14:36:48.767322 1751 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:36:48.767330 kubelet[1751]: I1213 14:36:48.767330 1751 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:48.768143 kubelet[1751]: I1213 14:36:48.768129 1751 policy_none.go:49] "None policy: Start" Dec 13 14:36:48.768464 kubelet[1751]: I1213 14:36:48.768412 1751 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:36:48.768533 kubelet[1751]: I1213 14:36:48.768527 1751 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:36:48.779119 systemd[1]: Created slice kubepods.slice. Dec 13 14:36:48.783971 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:36:48.785952 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:36:48.791130 kubelet[1751]: I1213 14:36:48.791120 1751 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:36:48.789000 audit[1751]: AVC avc: denied { mac_admin } for pid=1751 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:48.789000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:48.789000 audit[1751]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dfaba0 a1=c000eb6090 a2=c000dfab70 a3=25 items=0 ppid=1 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:48.789000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:48.791384 kubelet[1751]: I1213 14:36:48.791375 1751 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:36:48.791479 kubelet[1751]: I1213 14:36:48.791472 1751 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:36:48.791536 kubelet[1751]: I1213 14:36:48.791517 1751 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:36:48.793013 kubelet[1751]: I1213 14:36:48.793006 1751 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:36:48.794186 kubelet[1751]: E1213 14:36:48.794178 1751 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Dec 13 14:36:48.861451 systemd[1]: Created slice kubepods-burstable-poda52b86ce975f496e6002ba953fa9b888.slice. Dec 13 14:36:48.868164 systemd[1]: Created slice kubepods-burstable-pod48dcd184e9952cc7432761ccb9a6884e.slice. Dec 13 14:36:48.870506 systemd[1]: Created slice kubepods-burstable-pod50a9ae38ddb3bec3278d8dc73a6a7009.slice. Dec 13 14:36:48.892691 kubelet[1751]: I1213 14:36:48.892663 1751 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:48.892963 kubelet[1751]: E1213 14:36:48.892941 1751 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.110:6443/api/v1/nodes\": dial tcp 139.178.70.110:6443: connect: connection refused" node="localhost" Dec 13 14:36:48.941602 kubelet[1751]: E1213 14:36:48.941536 1751 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.110:6443: connect: connection refused" interval="400ms" Dec 13 14:36:48.942599 kubelet[1751]: I1213 14:36:48.942584 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:48.942724 kubelet[1751]: I1213 14:36:48.942710 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:48.942836 kubelet[1751]: I1213 14:36:48.942822 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:48.942926 kubelet[1751]: I1213 14:36:48.942914 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:48.943024 kubelet[1751]: I1213 14:36:48.943013 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:48.943122 kubelet[1751]: I1213 14:36:48.943110 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:48.943215 kubelet[1751]: I1213 14:36:48.943204 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:36:48.943318 kubelet[1751]: I1213 14:36:48.943299 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:48.943418 kubelet[1751]: I1213 14:36:48.943406 1751 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:49.094124 kubelet[1751]: I1213 14:36:49.094100 1751 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:49.094351 kubelet[1751]: E1213 14:36:49.094318 1751 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.110:6443/api/v1/nodes\": dial tcp 139.178.70.110:6443: connect: connection refused" node="localhost" Dec 13 14:36:49.168781 env[1267]: time="2024-12-13T14:36:49.168493567Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:49.170465 env[1267]: time="2024-12-13T14:36:49.170440270Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:48dcd184e9952cc7432761ccb9a6884e,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:49.172111 env[1267]: time="2024-12-13T14:36:49.172029288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:49.342539 kubelet[1751]: E1213 14:36:49.342510 1751 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.110:6443: connect: connection refused" interval="800ms" Dec 13 14:36:49.495987 kubelet[1751]: I1213 14:36:49.495969 1751 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:49.496521 kubelet[1751]: E1213 14:36:49.496499 1751 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.110:6443/api/v1/nodes\": dial tcp 139.178.70.110:6443: connect: connection refused" node="localhost" Dec 13 14:36:49.593455 kubelet[1751]: W1213 14:36:49.593374 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://139.178.70.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:49.593455 kubelet[1751]: E1213 14:36:49.593423 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://139.178.70.110:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:49.794295 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount189674456.mount: Deactivated successfully. Dec 13 14:36:49.839119 env[1267]: time="2024-12-13T14:36:49.839092800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.843734 env[1267]: time="2024-12-13T14:36:49.843681545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.860160 env[1267]: time="2024-12-13T14:36:49.860141729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.866546 env[1267]: time="2024-12-13T14:36:49.866524077Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.871194 env[1267]: time="2024-12-13T14:36:49.871176355Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.877236 env[1267]: time="2024-12-13T14:36:49.877211312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.892900 env[1267]: time="2024-12-13T14:36:49.892877161Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.897911 env[1267]: time="2024-12-13T14:36:49.897891483Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.905183 kubelet[1751]: W1213 14:36:49.905165 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://139.178.70.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:49.905250 kubelet[1751]: E1213 14:36:49.905191 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://139.178.70.110:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:49.905761 env[1267]: time="2024-12-13T14:36:49.905737414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.912986 env[1267]: time="2024-12-13T14:36:49.912971329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.938573 env[1267]: time="2024-12-13T14:36:49.938541067Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:49.977463 env[1267]: time="2024-12-13T14:36:49.977443044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:36:50.014812 env[1267]: time="2024-12-13T14:36:50.013979314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:50.014812 env[1267]: time="2024-12-13T14:36:50.014008676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:50.014812 env[1267]: time="2024-12-13T14:36:50.014015675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:50.014812 env[1267]: time="2024-12-13T14:36:50.014126687Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7f63b1d084a243830311a1503505756b163843373f301ab6be7be96bff7082c pid=1803 runtime=io.containerd.runc.v2 Dec 13 14:36:50.015676 env[1267]: time="2024-12-13T14:36:50.011492984Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:50.015676 env[1267]: time="2024-12-13T14:36:50.011515668Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:50.015676 env[1267]: time="2024-12-13T14:36:50.011536306Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:50.015676 env[1267]: time="2024-12-13T14:36:50.011613648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d9af94d0378b884c04893727c6d96ecb9725e0fc196f2de99aee389822948599 pid=1791 runtime=io.containerd.runc.v2 Dec 13 14:36:50.026740 systemd[1]: Started cri-containerd-d9af94d0378b884c04893727c6d96ecb9725e0fc196f2de99aee389822948599.scope. Dec 13 14:36:50.037324 env[1267]: time="2024-12-13T14:36:50.036257556Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:50.037324 env[1267]: time="2024-12-13T14:36:50.036307918Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:50.037324 env[1267]: time="2024-12-13T14:36:50.036322875Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:50.037324 env[1267]: time="2024-12-13T14:36:50.036402712Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b21be277babb408d093d0693c8b2035f94f7e42be2a905d6b6d86a04aada984a pid=1840 runtime=io.containerd.runc.v2 Dec 13 14:36:50.039992 systemd[1]: Started cri-containerd-e7f63b1d084a243830311a1503505756b163843373f301ab6be7be96bff7082c.scope. Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.040000 audit: BPF prog-id=58 op=LOAD Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1791 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616639346430333738623838346330343839333732376336643936 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1791 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616639346430333738623838346330343839333732376336643936 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.041000 audit: BPF prog-id=59 op=LOAD Dec 13 14:36:50.041000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00020b200 items=0 ppid=1791 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616639346430333738623838346330343839333732376336643936 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.043000 audit: BPF prog-id=60 op=LOAD Dec 13 14:36:50.043000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00020b248 items=0 ppid=1791 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616639346430333738623838346330343839333732376336643936 Dec 13 14:36:50.044000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:36:50.044000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { perfmon } for pid=1819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit[1819]: AVC avc: denied { bpf } for pid=1819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.044000 audit: BPF prog-id=61 op=LOAD Dec 13 14:36:50.044000 audit[1819]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00020b658 items=0 ppid=1791 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6439616639346430333738623838346330343839333732376336643936 Dec 13 14:36:50.061172 systemd[1]: Started cri-containerd-b21be277babb408d093d0693c8b2035f94f7e42be2a905d6b6d86a04aada984a.scope. Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.063000 audit: BPF prog-id=62 op=LOAD Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1803 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537663633623164303834613234333833303331316131353033353035 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1803 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537663633623164303834613234333833303331316131353033353035 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit: BPF prog-id=63 op=LOAD Dec 13 14:36:50.064000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000f9d90 items=0 ppid=1803 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537663633623164303834613234333833303331316131353033353035 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit: BPF prog-id=64 op=LOAD Dec 13 14:36:50.064000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000f9dd8 items=0 ppid=1803 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537663633623164303834613234333833303331316131353033353035 Dec 13 14:36:50.064000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:36:50.064000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { perfmon } for pid=1821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit[1821]: AVC avc: denied { bpf } for pid=1821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.064000 audit: BPF prog-id=65 op=LOAD Dec 13 14:36:50.064000 audit[1821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee1e8 items=0 ppid=1803 pid=1821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.064000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537663633623164303834613234333833303331316131353033353035 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit: BPF prog-id=66 op=LOAD Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1840 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316265323737626162623430386430393364303639336338623230 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1840 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316265323737626162623430386430393364303639336338623230 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit: BPF prog-id=67 op=LOAD Dec 13 14:36:50.077000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c4310 items=0 ppid=1840 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316265323737626162623430386430393364303639336338623230 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit: BPF prog-id=68 op=LOAD Dec 13 14:36:50.077000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c4358 items=0 ppid=1840 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316265323737626162623430386430393364303639336338623230 Dec 13 14:36:50.077000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:36:50.077000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { perfmon } for pid=1865 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit[1865]: AVC avc: denied { bpf } for pid=1865 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.077000 audit: BPF prog-id=69 op=LOAD Dec 13 14:36:50.077000 audit[1865]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4768 items=0 ppid=1840 pid=1865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6232316265323737626162623430386430393364303639336338623230 Dec 13 14:36:50.084185 env[1267]: time="2024-12-13T14:36:50.084164160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:48dcd184e9952cc7432761ccb9a6884e,Namespace:kube-system,Attempt:0,} returns sandbox id \"d9af94d0378b884c04893727c6d96ecb9725e0fc196f2de99aee389822948599\"" Dec 13 14:36:50.087756 env[1267]: time="2024-12-13T14:36:50.085636336Z" level=info msg="CreateContainer within sandbox \"d9af94d0378b884c04893727c6d96ecb9725e0fc196f2de99aee389822948599\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:36:50.101374 env[1267]: time="2024-12-13T14:36:50.101317835Z" level=info msg="CreateContainer within sandbox \"d9af94d0378b884c04893727c6d96ecb9725e0fc196f2de99aee389822948599\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7489d396f15ae950fd43e829329ff52447f7435907681af82178e83b37c8e5cc\"" Dec 13 14:36:50.105267 env[1267]: time="2024-12-13T14:36:50.105253597Z" level=info msg="StartContainer for \"7489d396f15ae950fd43e829329ff52447f7435907681af82178e83b37c8e5cc\"" Dec 13 14:36:50.108696 env[1267]: time="2024-12-13T14:36:50.108672214Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:a52b86ce975f496e6002ba953fa9b888,Namespace:kube-system,Attempt:0,} returns sandbox id \"e7f63b1d084a243830311a1503505756b163843373f301ab6be7be96bff7082c\"" Dec 13 14:36:50.109911 env[1267]: time="2024-12-13T14:36:50.109875878Z" level=info msg="CreateContainer within sandbox \"e7f63b1d084a243830311a1503505756b163843373f301ab6be7be96bff7082c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:36:50.114866 env[1267]: time="2024-12-13T14:36:50.114844472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:50a9ae38ddb3bec3278d8dc73a6a7009,Namespace:kube-system,Attempt:0,} returns sandbox id \"b21be277babb408d093d0693c8b2035f94f7e42be2a905d6b6d86a04aada984a\"" Dec 13 14:36:50.116079 env[1267]: time="2024-12-13T14:36:50.116062590Z" level=info msg="CreateContainer within sandbox \"b21be277babb408d093d0693c8b2035f94f7e42be2a905d6b6d86a04aada984a\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:36:50.118997 systemd[1]: Started cri-containerd-7489d396f15ae950fd43e829329ff52447f7435907681af82178e83b37c8e5cc.scope. Dec 13 14:36:50.127065 env[1267]: time="2024-12-13T14:36:50.127036226Z" level=info msg="CreateContainer within sandbox \"e7f63b1d084a243830311a1503505756b163843373f301ab6be7be96bff7082c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"c21dd43679fe5247bdb10a7c6afa11db38df8cb35b8e0af836c0492b5d309f04\"" Dec 13 14:36:50.127361 env[1267]: time="2024-12-13T14:36:50.127348669Z" level=info msg="StartContainer for \"c21dd43679fe5247bdb10a7c6afa11db38df8cb35b8e0af836c0492b5d309f04\"" Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit: BPF prog-id=70 op=LOAD Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1791 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383964333936663135616539353066643433653832393332396666 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1791 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383964333936663135616539353066643433653832393332396666 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.127000 audit: BPF prog-id=71 op=LOAD Dec 13 14:36:50.127000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003cc690 items=0 ppid=1791 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.127000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383964333936663135616539353066643433653832393332396666 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.129000 audit: BPF prog-id=72 op=LOAD Dec 13 14:36:50.129000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003cc6d8 items=0 ppid=1791 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.129000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383964333936663135616539353066643433653832393332396666 Dec 13 14:36:50.129000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:36:50.130000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { perfmon } for pid=1917 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.132224 env[1267]: time="2024-12-13T14:36:50.132207233Z" level=info msg="CreateContainer within sandbox \"b21be277babb408d093d0693c8b2035f94f7e42be2a905d6b6d86a04aada984a\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"e2cb6a703452df4f966416ed6b078be9f6b18c60f545b7a6cbd303de7bf00aa3\"" Dec 13 14:36:50.132489 env[1267]: time="2024-12-13T14:36:50.132477014Z" level=info msg="StartContainer for \"e2cb6a703452df4f966416ed6b078be9f6b18c60f545b7a6cbd303de7bf00aa3\"" Dec 13 14:36:50.130000 audit[1917]: AVC avc: denied { bpf } for pid=1917 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.130000 audit: BPF prog-id=73 op=LOAD Dec 13 14:36:50.130000 audit[1917]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ccae8 items=0 ppid=1791 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383964333936663135616539353066643433653832393332396666 Dec 13 14:36:50.143187 kubelet[1751]: E1213 14:36:50.143148 1751 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://139.178.70.110:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 139.178.70.110:6443: connect: connection refused" interval="1.6s" Dec 13 14:36:50.144186 systemd[1]: Started cri-containerd-c21dd43679fe5247bdb10a7c6afa11db38df8cb35b8e0af836c0492b5d309f04.scope. Dec 13 14:36:50.154046 systemd[1]: Started cri-containerd-e2cb6a703452df4f966416ed6b078be9f6b18c60f545b7a6cbd303de7bf00aa3.scope. Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.160000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit: BPF prog-id=74 op=LOAD Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1803 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332316464343336373966653532343762646231306137633661666131 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1803 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332316464343336373966653532343762646231306137633661666131 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.161000 audit: BPF prog-id=75 op=LOAD Dec 13 14:36:50.161000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00042e840 items=0 ppid=1803 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.161000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332316464343336373966653532343762646231306137633661666131 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.163000 audit: BPF prog-id=76 op=LOAD Dec 13 14:36:50.163000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00042e888 items=0 ppid=1803 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332316464343336373966653532343762646231306137633661666131 Dec 13 14:36:50.163000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:36:50.163000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.164000 audit: BPF prog-id=77 op=LOAD Dec 13 14:36:50.164000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00042ec98 items=0 ppid=1803 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332316464343336373966653532343762646231306137633661666131 Dec 13 14:36:50.170686 env[1267]: time="2024-12-13T14:36:50.170667785Z" level=info msg="StartContainer for \"7489d396f15ae950fd43e829329ff52447f7435907681af82178e83b37c8e5cc\" returns successfully" Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit: BPF prog-id=78 op=LOAD Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1840 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532636236613730333435326466346639363634313665643662303738 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1840 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532636236613730333435326466346639363634313665643662303738 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit: BPF prog-id=79 op=LOAD Dec 13 14:36:50.170000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00022bcb0 items=0 ppid=1840 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532636236613730333435326466346639363634313665643662303738 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit: BPF prog-id=80 op=LOAD Dec 13 14:36:50.170000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00022bcf8 items=0 ppid=1840 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532636236613730333435326466346639363634313665643662303738 Dec 13 14:36:50.170000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:36:50.170000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:50.170000 audit: BPF prog-id=81 op=LOAD Dec 13 14:36:50.170000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000276108 items=0 ppid=1840 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:50.170000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532636236613730333435326466346639363634313665643662303738 Dec 13 14:36:50.189537 env[1267]: time="2024-12-13T14:36:50.189516396Z" level=info msg="StartContainer for \"c21dd43679fe5247bdb10a7c6afa11db38df8cb35b8e0af836c0492b5d309f04\" returns successfully" Dec 13 14:36:50.197102 env[1267]: time="2024-12-13T14:36:50.197079886Z" level=info msg="StartContainer for \"e2cb6a703452df4f966416ed6b078be9f6b18c60f545b7a6cbd303de7bf00aa3\" returns successfully" Dec 13 14:36:50.197707 kubelet[1751]: W1213 14:36:50.197662 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://139.178.70.110:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:50.197759 kubelet[1751]: E1213 14:36:50.197713 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://139.178.70.110:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:50.222387 kubelet[1751]: W1213 14:36:50.222346 1751 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://139.178.70.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 139.178.70.110:6443: connect: connection refused Dec 13 14:36:50.222468 kubelet[1751]: E1213 14:36:50.222394 1751 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://139.178.70.110:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:50.297797 kubelet[1751]: I1213 14:36:50.297778 1751 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:50.297969 kubelet[1751]: E1213 14:36:50.297952 1751 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://139.178.70.110:6443/api/v1/nodes\": dial tcp 139.178.70.110:6443: connect: connection refused" node="localhost" Dec 13 14:36:50.677000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:50.677000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b00030 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:50.677000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:50.678000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:50.678000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009aa060 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:50.678000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:50.829339 kubelet[1751]: E1213 14:36:50.829307 1751 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://139.178.70.110:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 139.178.70.110:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:36:51.484000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.484000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006b1e270 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.484000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.484000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0020ced20 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.484000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.484000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006b1e390 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.487000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.487000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c006b1e510 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.487000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.496000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.496000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0025a3040 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.496000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:51.496000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c006de1ce0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:36:51.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:36:51.748018 kubelet[1751]: E1213 14:36:51.747940 1751 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Dec 13 14:36:51.899591 kubelet[1751]: I1213 14:36:51.899560 1751 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:51.908068 kubelet[1751]: I1213 14:36:51.908046 1751 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:36:51.908068 kubelet[1751]: E1213 14:36:51.908070 1751 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" Dec 13 14:36:51.913908 kubelet[1751]: E1213 14:36:51.913890 1751 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:36:52.014490 kubelet[1751]: E1213 14:36:52.014421 1751 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:36:52.115095 kubelet[1751]: E1213 14:36:52.115072 1751 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:36:52.215663 kubelet[1751]: E1213 14:36:52.215642 1751 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" Dec 13 14:36:52.730570 kubelet[1751]: I1213 14:36:52.730555 1751 apiserver.go:52] "Watching apiserver" Dec 13 14:36:52.840912 kubelet[1751]: I1213 14:36:52.840884 1751 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:36:53.066378 kernel: kauditd_printk_skb: 594 callbacks suppressed Dec 13 14:36:53.066465 kernel: audit: type=1400 audit(1734100613.060:560): avc: denied { watch } for pid=1975 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.060000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=7330 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:36:53.060000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b761c0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.070661 kernel: audit: type=1300 audit(1734100613.060:560): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b761c0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.070768 kernel: audit: type=1327 audit(1734100613.060:560): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.060000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.425604 systemd[1]: Reloading. Dec 13 14:36:53.482342 /usr/lib/systemd/system-generators/torcx-generator[2042]: time="2024-12-13T14:36:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:36:53.482358 /usr/lib/systemd/system-generators/torcx-generator[2042]: time="2024-12-13T14:36:53Z" level=info msg="torcx already run" Dec 13 14:36:53.495000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.495000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d78a00 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.504508 kernel: audit: type=1400 audit(1734100613.495:561): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.504546 kernel: audit: type=1300 audit(1734100613.495:561): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d78a00 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.495000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.507967 kernel: audit: type=1327 audit(1734100613.495:561): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.499000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.511097 kernel: audit: type=1400 audit(1734100613.499:562): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.499000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d78d20 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.515138 kernel: audit: type=1300 audit(1734100613.499:562): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d78d20 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.518549 kernel: audit: type=1327 audit(1734100613.499:562): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.499000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.521567 kernel: audit: type=1400 audit(1734100613.499:563): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.499000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d78d60 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.499000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:36:53.499000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000d790a0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:36:53.499000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:36:53.558407 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:36:53.558418 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:36:53.570402 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit: BPF prog-id=82 op=LOAD Dec 13 14:36:53.621000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit: BPF prog-id=83 op=LOAD Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit: BPF prog-id=84 op=LOAD Dec 13 14:36:53.621000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:36:53.621000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.621000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit: BPF prog-id=85 op=LOAD Dec 13 14:36:53.622000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit: BPF prog-id=86 op=LOAD Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit: BPF prog-id=87 op=LOAD Dec 13 14:36:53.622000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:36:53.622000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.622000 audit: BPF prog-id=88 op=LOAD Dec 13 14:36:53.622000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.623000 audit: BPF prog-id=89 op=LOAD Dec 13 14:36:53.623000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit: BPF prog-id=90 op=LOAD Dec 13 14:36:53.624000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit: BPF prog-id=91 op=LOAD Dec 13 14:36:53.625000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit: BPF prog-id=92 op=LOAD Dec 13 14:36:53.625000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.625000 audit: BPF prog-id=93 op=LOAD Dec 13 14:36:53.625000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit: BPF prog-id=94 op=LOAD Dec 13 14:36:53.626000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit: BPF prog-id=95 op=LOAD Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.626000 audit: BPF prog-id=96 op=LOAD Dec 13 14:36:53.626000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:36:53.626000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit: BPF prog-id=97 op=LOAD Dec 13 14:36:53.627000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit: BPF prog-id=98 op=LOAD Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit: BPF prog-id=99 op=LOAD Dec 13 14:36:53.628000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:36:53.628000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit: BPF prog-id=100 op=LOAD Dec 13 14:36:53.628000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.628000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit: BPF prog-id=101 op=LOAD Dec 13 14:36:53.629000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:53.629000 audit: BPF prog-id=102 op=LOAD Dec 13 14:36:53.629000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:36:53.644216 systemd[1]: Stopping kubelet.service... Dec 13 14:36:53.674082 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:36:53.672000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:53.674218 systemd[1]: Stopped kubelet.service. Dec 13 14:36:53.676192 systemd[1]: Starting kubelet.service... Dec 13 14:36:54.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:54.725637 systemd[1]: Started kubelet.service. Dec 13 14:36:54.806185 kubelet[2106]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:54.806392 kubelet[2106]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:36:54.806434 kubelet[2106]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:36:54.806612 kubelet[2106]: I1213 14:36:54.806588 2106 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:36:54.835552 kubelet[2106]: I1213 14:36:54.835523 2106 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:36:54.835552 kubelet[2106]: I1213 14:36:54.835550 2106 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:36:54.835764 kubelet[2106]: I1213 14:36:54.835752 2106 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:36:54.836675 kubelet[2106]: I1213 14:36:54.836657 2106 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:36:54.884061 kubelet[2106]: I1213 14:36:54.884039 2106 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:36:54.886001 kubelet[2106]: E1213 14:36:54.885988 2106 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:36:54.886060 kubelet[2106]: I1213 14:36:54.886052 2106 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:36:54.893481 kubelet[2106]: I1213 14:36:54.893194 2106 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:36:54.893481 kubelet[2106]: I1213 14:36:54.893272 2106 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:36:54.893481 kubelet[2106]: I1213 14:36:54.893347 2106 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:36:54.893581 kubelet[2106]: I1213 14:36:54.893361 2106 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:36:54.893581 kubelet[2106]: I1213 14:36:54.893547 2106 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:36:54.893581 kubelet[2106]: I1213 14:36:54.893553 2106 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:36:54.893581 kubelet[2106]: I1213 14:36:54.893578 2106 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:54.893685 kubelet[2106]: I1213 14:36:54.893636 2106 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:36:54.893685 kubelet[2106]: I1213 14:36:54.893649 2106 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:36:54.893685 kubelet[2106]: I1213 14:36:54.893667 2106 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:36:54.893685 kubelet[2106]: I1213 14:36:54.893675 2106 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:36:54.911507 kubelet[2106]: I1213 14:36:54.911483 2106 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:36:54.913224 kubelet[2106]: I1213 14:36:54.911803 2106 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:36:54.913224 kubelet[2106]: I1213 14:36:54.912147 2106 server.go:1269] "Started kubelet" Dec 13 14:36:54.919895 kubelet[2106]: I1213 14:36:54.916699 2106 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:36:54.919895 kubelet[2106]: I1213 14:36:54.917426 2106 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:36:54.918000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.918000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:54.918000 audit[2106]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005e5bf0 a1=c000c8f668 a2=c0005e5bc0 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:54.918000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.918000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:54.918000 audit[2106]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00037c6e0 a1=c000c8f680 a2=c0005e5cb0 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.918000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:54.920849 kubelet[2106]: I1213 14:36:54.920599 2106 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:36:54.920849 kubelet[2106]: I1213 14:36:54.920646 2106 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:36:54.920849 kubelet[2106]: I1213 14:36:54.920666 2106 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:36:54.924217 kubelet[2106]: I1213 14:36:54.923580 2106 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:36:54.924410 kubelet[2106]: I1213 14:36:54.924398 2106 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:36:54.930518 kubelet[2106]: E1213 14:36:54.930503 2106 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:36:54.930828 kubelet[2106]: I1213 14:36:54.930818 2106 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:36:54.934214 kubelet[2106]: I1213 14:36:54.934203 2106 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:36:54.934361 kubelet[2106]: I1213 14:36:54.934352 2106 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:36:54.934472 kubelet[2106]: I1213 14:36:54.934466 2106 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:36:54.934833 kubelet[2106]: I1213 14:36:54.934824 2106 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:36:54.934933 kubelet[2106]: I1213 14:36:54.934922 2106 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:36:54.935762 kubelet[2106]: I1213 14:36:54.935754 2106 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:36:54.941100 kubelet[2106]: I1213 14:36:54.941077 2106 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:36:54.941635 kubelet[2106]: I1213 14:36:54.941621 2106 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:36:54.941661 kubelet[2106]: I1213 14:36:54.941640 2106 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:36:54.941661 kubelet[2106]: I1213 14:36:54.941650 2106 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:36:54.941695 kubelet[2106]: E1213 14:36:54.941672 2106 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:36:54.968383 kubelet[2106]: I1213 14:36:54.968363 2106 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:36:54.968383 kubelet[2106]: I1213 14:36:54.968374 2106 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:36:54.968383 kubelet[2106]: I1213 14:36:54.968385 2106 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:36:54.968506 kubelet[2106]: I1213 14:36:54.968483 2106 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:36:54.968506 kubelet[2106]: I1213 14:36:54.968490 2106 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:36:54.968506 kubelet[2106]: I1213 14:36:54.968502 2106 policy_none.go:49] "None policy: Start" Dec 13 14:36:54.968935 kubelet[2106]: I1213 14:36:54.968922 2106 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:36:54.968935 kubelet[2106]: I1213 14:36:54.968934 2106 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:36:54.969036 kubelet[2106]: I1213 14:36:54.969024 2106 state_mem.go:75] "Updated machine memory state" Dec 13 14:36:54.971001 kubelet[2106]: I1213 14:36:54.970988 2106 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:36:54.969000 audit[2106]: AVC avc: denied { mac_admin } for pid=2106 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:54.969000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:36:54.969000 audit[2106]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0000596b0 a1=c000921200 a2=c000059650 a3=25 items=0 ppid=1 pid=2106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:54.969000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:36:54.971155 kubelet[2106]: I1213 14:36:54.971033 2106 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:36:54.971155 kubelet[2106]: I1213 14:36:54.971099 2106 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:36:54.971155 kubelet[2106]: I1213 14:36:54.971106 2106 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:36:54.973289 kubelet[2106]: I1213 14:36:54.973277 2106 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:36:55.055101 kubelet[2106]: E1213 14:36:55.055034 2106 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Dec 13 14:36:55.055371 kubelet[2106]: E1213 14:36:55.055358 2106 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:55.075725 kubelet[2106]: I1213 14:36:55.075674 2106 kubelet_node_status.go:72] "Attempting to register node" node="localhost" Dec 13 14:36:55.081621 kubelet[2106]: I1213 14:36:55.081605 2106 kubelet_node_status.go:111] "Node was previously registered" node="localhost" Dec 13 14:36:55.081702 kubelet[2106]: I1213 14:36:55.081683 2106 kubelet_node_status.go:75] "Successfully registered node" node="localhost" Dec 13 14:36:55.136519 kubelet[2106]: I1213 14:36:55.136493 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:55.136616 kubelet[2106]: I1213 14:36:55.136527 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:55.136616 kubelet[2106]: I1213 14:36:55.136542 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:55.136616 kubelet[2106]: I1213 14:36:55.136553 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:55.136616 kubelet[2106]: I1213 14:36:55.136562 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:55.136616 kubelet[2106]: I1213 14:36:55.136579 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:55.136716 kubelet[2106]: I1213 14:36:55.136601 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/48dcd184e9952cc7432761ccb9a6884e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"48dcd184e9952cc7432761ccb9a6884e\") " pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:55.136716 kubelet[2106]: I1213 14:36:55.136613 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/50a9ae38ddb3bec3278d8dc73a6a7009-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"50a9ae38ddb3bec3278d8dc73a6a7009\") " pod="kube-system/kube-controller-manager-localhost" Dec 13 14:36:55.136716 kubelet[2106]: I1213 14:36:55.136621 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/a52b86ce975f496e6002ba953fa9b888-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"a52b86ce975f496e6002ba953fa9b888\") " pod="kube-system/kube-scheduler-localhost" Dec 13 14:36:55.894787 kubelet[2106]: I1213 14:36:55.894735 2106 apiserver.go:52] "Watching apiserver" Dec 13 14:36:55.934824 kubelet[2106]: I1213 14:36:55.934795 2106 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:36:55.967369 kubelet[2106]: E1213 14:36:55.967344 2106 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Dec 13 14:36:56.042194 kubelet[2106]: I1213 14:36:56.042149 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=3.042137796 podStartE2EDuration="3.042137796s" podCreationTimestamp="2024-12-13 14:36:53 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:56.001021464 +0000 UTC m=+1.245548574" watchObservedRunningTime="2024-12-13 14:36:56.042137796 +0000 UTC m=+1.286664897" Dec 13 14:36:56.066727 kubelet[2106]: I1213 14:36:56.066695 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=4.066680562 podStartE2EDuration="4.066680562s" podCreationTimestamp="2024-12-13 14:36:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:56.042713847 +0000 UTC m=+1.287240954" watchObservedRunningTime="2024-12-13 14:36:56.066680562 +0000 UTC m=+1.311207662" Dec 13 14:36:56.071703 kubelet[2106]: I1213 14:36:56.071669 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.071658292 podStartE2EDuration="1.071658292s" podCreationTimestamp="2024-12-13 14:36:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:56.067181408 +0000 UTC m=+1.311708517" watchObservedRunningTime="2024-12-13 14:36:56.071658292 +0000 UTC m=+1.316185395" Dec 13 14:36:57.733834 kubelet[2106]: I1213 14:36:57.733813 2106 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:36:57.734348 env[1267]: time="2024-12-13T14:36:57.734318587Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:36:57.734617 kubelet[2106]: I1213 14:36:57.734605 2106 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:36:58.597512 systemd[1]: Created slice kubepods-besteffort-pod0158b427_e48b_4661_9e92_96b81c568865.slice. Dec 13 14:36:58.663518 kubelet[2106]: I1213 14:36:58.663493 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0158b427-e48b-4661-9e92-96b81c568865-lib-modules\") pod \"kube-proxy-9gk2n\" (UID: \"0158b427-e48b-4661-9e92-96b81c568865\") " pod="kube-system/kube-proxy-9gk2n" Dec 13 14:36:58.663760 kubelet[2106]: I1213 14:36:58.663724 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z52z4\" (UniqueName: \"kubernetes.io/projected/0158b427-e48b-4661-9e92-96b81c568865-kube-api-access-z52z4\") pod \"kube-proxy-9gk2n\" (UID: \"0158b427-e48b-4661-9e92-96b81c568865\") " pod="kube-system/kube-proxy-9gk2n" Dec 13 14:36:58.663854 kubelet[2106]: I1213 14:36:58.663844 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0158b427-e48b-4661-9e92-96b81c568865-kube-proxy\") pod \"kube-proxy-9gk2n\" (UID: \"0158b427-e48b-4661-9e92-96b81c568865\") " pod="kube-system/kube-proxy-9gk2n" Dec 13 14:36:58.663932 kubelet[2106]: I1213 14:36:58.663919 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0158b427-e48b-4661-9e92-96b81c568865-xtables-lock\") pod \"kube-proxy-9gk2n\" (UID: \"0158b427-e48b-4661-9e92-96b81c568865\") " pod="kube-system/kube-proxy-9gk2n" Dec 13 14:36:58.671357 systemd[1]: Created slice kubepods-besteffort-pod02089a60_d781_41a1_9f9f_7a7b871731ed.slice. Dec 13 14:36:58.764438 kubelet[2106]: I1213 14:36:58.764416 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8ddkt\" (UniqueName: \"kubernetes.io/projected/02089a60-d781-41a1-9f9f-7a7b871731ed-kube-api-access-8ddkt\") pod \"tigera-operator-76c4976dd7-t54wh\" (UID: \"02089a60-d781-41a1-9f9f-7a7b871731ed\") " pod="tigera-operator/tigera-operator-76c4976dd7-t54wh" Dec 13 14:36:58.764719 kubelet[2106]: I1213 14:36:58.764696 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/02089a60-d781-41a1-9f9f-7a7b871731ed-var-lib-calico\") pod \"tigera-operator-76c4976dd7-t54wh\" (UID: \"02089a60-d781-41a1-9f9f-7a7b871731ed\") " pod="tigera-operator/tigera-operator-76c4976dd7-t54wh" Dec 13 14:36:58.781476 kubelet[2106]: I1213 14:36:58.781457 2106 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:36:58.902673 env[1267]: time="2024-12-13T14:36:58.902253135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9gk2n,Uid:0158b427-e48b-4661-9e92-96b81c568865,Namespace:kube-system,Attempt:0,}" Dec 13 14:36:58.976147 env[1267]: time="2024-12-13T14:36:58.975941242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-t54wh,Uid:02089a60-d781-41a1-9f9f-7a7b871731ed,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:36:59.006171 env[1267]: time="2024-12-13T14:36:59.006077271Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:59.006271 env[1267]: time="2024-12-13T14:36:59.006159442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:59.006271 env[1267]: time="2024-12-13T14:36:59.006167409Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:59.006373 env[1267]: time="2024-12-13T14:36:59.006355089Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a82323c072224abea6985543b3b728cce2c5509f1e6c87c2c9506d380979a994 pid=2173 runtime=io.containerd.runc.v2 Dec 13 14:36:59.023399 systemd[1]: Started cri-containerd-a82323c072224abea6985543b3b728cce2c5509f1e6c87c2c9506d380979a994.scope. Dec 13 14:36:59.030964 env[1267]: time="2024-12-13T14:36:59.030926596Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:36:59.031046 env[1267]: time="2024-12-13T14:36:59.030966382Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:36:59.031046 env[1267]: time="2024-12-13T14:36:59.030992101Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:36:59.031114 env[1267]: time="2024-12-13T14:36:59.031076357Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddd7b54a390365fc318e4b950c06f7fa5360e89f7aeb76f13924ee6cbe51cb9a pid=2201 runtime=io.containerd.runc.v2 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.040147 kernel: kauditd_printk_skb: 263 callbacks suppressed Dec 13 14:36:59.040188 kernel: audit: type=1400 audit(1734100619.033:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.046774 kernel: audit: type=1400 audit(1734100619.033:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.050126 kernel: audit: type=1400 audit(1734100619.033:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.052756 kernel: audit: type=1400 audit(1734100619.033:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.056859 kernel: audit: type=1400 audit(1734100619.033:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.062118 kernel: audit: type=1400 audit(1734100619.033:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.062169 kernel: audit: type=1400 audit(1734100619.033:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.065548 env[1267]: time="2024-12-13T14:36:59.063852386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-9gk2n,Uid:0158b427-e48b-4661-9e92-96b81c568865,Namespace:kube-system,Attempt:0,} returns sandbox id \"a82323c072224abea6985543b3b728cce2c5509f1e6c87c2c9506d380979a994\"" Dec 13 14:36:59.065548 env[1267]: time="2024-12-13T14:36:59.065467054Z" level=info msg="CreateContainer within sandbox \"a82323c072224abea6985543b3b728cce2c5509f1e6c87c2c9506d380979a994\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:36:59.065759 kernel: audit: type=1400 audit(1734100619.033:821): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.071065 kernel: audit: type=1400 audit(1734100619.033:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.071120 kernel: audit: type=1400 audit(1734100619.033:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.033000 audit: BPF prog-id=103 op=LOAD Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323332336330373232323461626561363938353534336233623732 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323332336330373232323461626561363938353534336233623732 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit: BPF prog-id=104 op=LOAD Dec 13 14:36:59.041000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000265d90 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323332336330373232323461626561363938353534336233623732 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit: BPF prog-id=105 op=LOAD Dec 13 14:36:59.041000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000265dd8 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323332336330373232323461626561363938353534336233623732 Dec 13 14:36:59.041000 audit: BPF prog-id=105 op=UNLOAD Dec 13 14:36:59.041000 audit: BPF prog-id=104 op=UNLOAD Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { perfmon } for pid=2183 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit[2183]: AVC avc: denied { bpf } for pid=2183 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.041000 audit: BPF prog-id=106 op=LOAD Dec 13 14:36:59.041000 audit[2183]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003401e8 items=0 ppid=2173 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138323332336330373232323461626561363938353534336233623732 Dec 13 14:36:59.079928 env[1267]: time="2024-12-13T14:36:59.079313384Z" level=info msg="CreateContainer within sandbox \"a82323c072224abea6985543b3b728cce2c5509f1e6c87c2c9506d380979a994\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"79b824ebeaf3086aec8cbcc9fabdb7a2e94dfbde938c86c7c74929659cb94f0f\"" Dec 13 14:36:59.081071 env[1267]: time="2024-12-13T14:36:59.081040724Z" level=info msg="StartContainer for \"79b824ebeaf3086aec8cbcc9fabdb7a2e94dfbde938c86c7c74929659cb94f0f\"" Dec 13 14:36:59.085592 systemd[1]: Started cri-containerd-ddd7b54a390365fc318e4b950c06f7fa5360e89f7aeb76f13924ee6cbe51cb9a.scope. Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit: BPF prog-id=107 op=LOAD Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643762353461333930333635666333313865346239353063303666 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643762353461333930333635666333313865346239353063303666 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit: BPF prog-id=108 op=LOAD Dec 13 14:36:59.095000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002136c0 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643762353461333930333635666333313865346239353063303666 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit: BPF prog-id=109 op=LOAD Dec 13 14:36:59.095000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000213708 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643762353461333930333635666333313865346239353063303666 Dec 13 14:36:59.095000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:36:59.095000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.095000 audit: BPF prog-id=110 op=LOAD Dec 13 14:36:59.095000 audit[2219]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000213b18 items=0 ppid=2201 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464643762353461333930333635666333313865346239353063303666 Dec 13 14:36:59.119758 systemd[1]: Started cri-containerd-79b824ebeaf3086aec8cbcc9fabdb7a2e94dfbde938c86c7c74929659cb94f0f.scope. Dec 13 14:36:59.134151 env[1267]: time="2024-12-13T14:36:59.131917539Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-t54wh,Uid:02089a60-d781-41a1-9f9f-7a7b871731ed,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ddd7b54a390365fc318e4b950c06f7fa5360e89f7aeb76f13924ee6cbe51cb9a\"" Dec 13 14:36:59.136278 env[1267]: time="2024-12-13T14:36:59.135573463Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f7d18537698 items=0 ppid=2173 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739623832346562656166333038366165633863626363396661626462 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.137000 audit: BPF prog-id=111 op=LOAD Dec 13 14:36:59.137000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000308388 items=0 ppid=2173 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739623832346562656166333038366165633863626363396661626462 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit: BPF prog-id=112 op=LOAD Dec 13 14:36:59.138000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0003083d8 items=0 ppid=2173 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739623832346562656166333038366165633863626363396661626462 Dec 13 14:36:59.138000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:36:59.138000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { perfmon } for pid=2252 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit[2252]: AVC avc: denied { bpf } for pid=2252 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:36:59.138000 audit: BPF prog-id=113 op=LOAD Dec 13 14:36:59.138000 audit[2252]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000308468 items=0 ppid=2173 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:36:59.138000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3739623832346562656166333038366165633863626363396661626462 Dec 13 14:36:59.155900 env[1267]: time="2024-12-13T14:36:59.155850078Z" level=info msg="StartContainer for \"79b824ebeaf3086aec8cbcc9fabdb7a2e94dfbde938c86c7c74929659cb94f0f\" returns successfully" Dec 13 14:36:59.270011 sudo[1485]: pam_unix(sudo:session): session closed for user root Dec 13 14:36:59.268000 audit[1485]: USER_END pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:59.268000 audit[1485]: CRED_DISP pid=1485 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:36:59.274549 sshd[1481]: pam_unix(sshd:session): session closed for user core Dec 13 14:36:59.273000 audit[1481]: USER_END pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:59.273000 audit[1481]: CRED_DISP pid=1481 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:36:59.276319 systemd[1]: sshd@6-139.178.70.110:22-147.75.109.163:45784.service: Deactivated successfully. Dec 13 14:36:59.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-139.178.70.110:22-147.75.109.163:45784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:36:59.276877 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:36:59.276979 systemd[1]: session-9.scope: Consumed 3.311s CPU time. Dec 13 14:36:59.277287 systemd-logind[1243]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:36:59.278079 systemd-logind[1243]: Removed session 9. Dec 13 14:37:00.056428 kubelet[2106]: I1213 14:37:00.056379 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-9gk2n" podStartSLOduration=2.056364142 podStartE2EDuration="2.056364142s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:36:59.981392629 +0000 UTC m=+5.225919733" watchObservedRunningTime="2024-12-13 14:37:00.056364142 +0000 UTC m=+5.300891250" Dec 13 14:37:00.758000 audit[2325]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2325 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:00.758000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffedb3727e0 a2=0 a3=7ffedb3727cc items=0 ppid=2262 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:37:00.759000 audit[2326]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.759000 audit[2326]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0bd22330 a2=0 a3=7ffc0bd2231c items=0 ppid=2262 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:37:00.760000 audit[2327]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:00.760000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff0682d6e0 a2=0 a3=7fff0682d6cc items=0 ppid=2262 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.760000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:37:00.761000 audit[2329]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:00.761000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd3147b50 a2=0 a3=7ffdd3147b3c items=0 ppid=2262 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:37:00.761000 audit[2328]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.761000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1795a930 a2=0 a3=7ffe1795a91c items=0 ppid=2262 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:37:00.765000 audit[2330]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.765000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd8c264cc0 a2=0 a3=7ffd8c264cac items=0 ppid=2262 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:37:00.864000 audit[2331]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.864000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd755ee150 a2=0 a3=7ffd755ee13c items=0 ppid=2262 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.864000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:37:00.868000 audit[2333]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.868000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffde421a270 a2=0 a3=7ffde421a25c items=0 ppid=2262 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:37:00.871000 audit[2336]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.871000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc8f849740 a2=0 a3=7ffc8f84972c items=0 ppid=2262 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:37:00.872000 audit[2337]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.872000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb585f8d0 a2=0 a3=7ffdb585f8bc items=0 ppid=2262 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.872000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:37:00.874000 audit[2339]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.874000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdc4544c70 a2=0 a3=7ffdc4544c5c items=0 ppid=2262 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.874000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:37:00.875000 audit[2340]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.875000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6136b730 a2=0 a3=7ffe6136b71c items=0 ppid=2262 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.875000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:37:00.877000 audit[2342]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.877000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd26dcedd0 a2=0 a3=7ffd26dcedbc items=0 ppid=2262 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:37:00.880000 audit[2345]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.880000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdbb898c40 a2=0 a3=7ffdbb898c2c items=0 ppid=2262 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:37:00.881000 audit[2346]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.881000 audit[2346]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb6033d50 a2=0 a3=7fffb6033d3c items=0 ppid=2262 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:37:00.883000 audit[2348]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.883000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcb8750eb0 a2=0 a3=7ffcb8750e9c items=0 ppid=2262 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.883000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:37:00.884000 audit[2349]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.884000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd14e7bc50 a2=0 a3=7ffd14e7bc3c items=0 ppid=2262 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:37:00.886000 audit[2351]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.886000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd19775480 a2=0 a3=7ffd1977546c items=0 ppid=2262 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.886000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:37:00.889000 audit[2354]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.889000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee4613970 a2=0 a3=7ffee461395c items=0 ppid=2262 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:37:00.891000 audit[2357]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.891000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff6c5df4c0 a2=0 a3=7fff6c5df4ac items=0 ppid=2262 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.891000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:37:00.892000 audit[2358]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.892000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc65fbdb40 a2=0 a3=7ffc65fbdb2c items=0 ppid=2262 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:37:00.897000 audit[2360]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.897000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd19eab7e0 a2=0 a3=7ffd19eab7cc items=0 ppid=2262 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:37:00.900000 audit[2363]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.900000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6341f7b0 a2=0 a3=7ffe6341f79c items=0 ppid=2262 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:37:00.900000 audit[2364]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.900000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc9c43b850 a2=0 a3=7ffc9c43b83c items=0 ppid=2262 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:37:00.902000 audit[2366]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:37:00.902000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffe6331f30 a2=0 a3=7fffe6331f1c items=0 ppid=2262 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.902000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:37:00.985000 audit[2372]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:00.985000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7fff77ece160 a2=0 a3=7fff77ece14c items=0 ppid=2262 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:00.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:01.010000 audit[2372]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:01.010000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff77ece160 a2=0 a3=7fff77ece14c items=0 ppid=2262 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.010000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:01.021000 audit[2377]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.021000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd8e4703a0 a2=0 a3=7ffd8e47038c items=0 ppid=2262 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.021000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:37:01.037000 audit[2379]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.037000 audit[2379]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe11df40b0 a2=0 a3=7ffe11df409c items=0 ppid=2262 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.037000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:37:01.042000 audit[2382]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.042000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffdb5cd39f0 a2=0 a3=7ffdb5cd39dc items=0 ppid=2262 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.042000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:37:01.043000 audit[2383]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.043000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd788c7680 a2=0 a3=7ffd788c766c items=0 ppid=2262 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:37:01.045000 audit[2385]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.045000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe421fdd00 a2=0 a3=7ffe421fdcec items=0 ppid=2262 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:37:01.046000 audit[2386]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2386 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.046000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5ad806e0 a2=0 a3=7fff5ad806cc items=0 ppid=2262 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.046000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:37:01.048000 audit[2388]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.048000 audit[2388]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe456bc270 a2=0 a3=7ffe456bc25c items=0 ppid=2262 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:37:01.050000 audit[2391]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.050000 audit[2391]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fff93db90e0 a2=0 a3=7fff93db90cc items=0 ppid=2262 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:37:01.051000 audit[2392]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.051000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5630ca30 a2=0 a3=7fff5630ca1c items=0 ppid=2262 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:37:01.053000 audit[2394]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.053000 audit[2394]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd62dfb910 a2=0 a3=7ffd62dfb8fc items=0 ppid=2262 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:37:01.053000 audit[2395]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2395 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.053000 audit[2395]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1a4d6860 a2=0 a3=7ffc1a4d684c items=0 ppid=2262 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:37:01.059000 audit[2397]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.059000 audit[2397]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff7c2ce4e0 a2=0 a3=7fff7c2ce4cc items=0 ppid=2262 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.059000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:37:01.061000 audit[2400]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2400 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.061000 audit[2400]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc86cf87f0 a2=0 a3=7ffc86cf87dc items=0 ppid=2262 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:37:01.064000 audit[2403]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.064000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd164fe200 a2=0 a3=7ffd164fe1ec items=0 ppid=2262 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.064000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:37:01.065000 audit[2404]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2404 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.065000 audit[2404]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffff2da3eb0 a2=0 a3=7ffff2da3e9c items=0 ppid=2262 pid=2404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:37:01.071000 audit[2406]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2406 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.071000 audit[2406]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff44722b10 a2=0 a3=7fff44722afc items=0 ppid=2262 pid=2406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:37:01.076000 audit[2409]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.076000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffec6c4e8f0 a2=0 a3=7ffec6c4e8dc items=0 ppid=2262 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:37:01.077000 audit[2410]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2410 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.077000 audit[2410]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7c95f1b0 a2=0 a3=7ffd7c95f19c items=0 ppid=2262 pid=2410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:37:01.082000 audit[2412]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.082000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc9a6981f0 a2=0 a3=7ffc9a6981dc items=0 ppid=2262 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:37:01.082000 audit[2413]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2413 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.082000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe3ebea0a0 a2=0 a3=7ffe3ebea08c items=0 ppid=2262 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.082000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:37:01.084000 audit[2415]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2415 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.084000 audit[2415]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcaeacd130 a2=0 a3=7ffcaeacd11c items=0 ppid=2262 pid=2415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.084000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:37:01.090000 audit[2418]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:37:01.090000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff262f0590 a2=0 a3=7fff262f057c items=0 ppid=2262 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.090000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:37:01.100000 audit[2420]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:37:01.100000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffc037521d0 a2=0 a3=7ffc037521bc items=0 ppid=2262 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.100000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:01.100000 audit[2420]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:37:01.100000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc037521d0 a2=0 a3=7ffc037521bc items=0 ppid=2262 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:01.100000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:01.715849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2583594211.mount: Deactivated successfully. Dec 13 14:37:02.413964 env[1267]: time="2024-12-13T14:37:02.413930634Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:02.436125 env[1267]: time="2024-12-13T14:37:02.436094832Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:02.445808 env[1267]: time="2024-12-13T14:37:02.445791403Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:02.456956 env[1267]: time="2024-12-13T14:37:02.456935080Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:02.457296 env[1267]: time="2024-12-13T14:37:02.457276853Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 14:37:02.458873 env[1267]: time="2024-12-13T14:37:02.458740947Z" level=info msg="CreateContainer within sandbox \"ddd7b54a390365fc318e4b950c06f7fa5360e89f7aeb76f13924ee6cbe51cb9a\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:37:02.486048 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1535100295.mount: Deactivated successfully. Dec 13 14:37:02.498611 env[1267]: time="2024-12-13T14:37:02.498581820Z" level=info msg="CreateContainer within sandbox \"ddd7b54a390365fc318e4b950c06f7fa5360e89f7aeb76f13924ee6cbe51cb9a\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b3b75e05ad9bb83a94ee14c48740b293f307f3de5dde269a7db11f3d0450d4e6\"" Dec 13 14:37:02.499980 env[1267]: time="2024-12-13T14:37:02.499945127Z" level=info msg="StartContainer for \"b3b75e05ad9bb83a94ee14c48740b293f307f3de5dde269a7db11f3d0450d4e6\"" Dec 13 14:37:02.515103 systemd[1]: Started cri-containerd-b3b75e05ad9bb83a94ee14c48740b293f307f3de5dde269a7db11f3d0450d4e6.scope. Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit: BPF prog-id=114 op=LOAD Dec 13 14:37:02.523000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.523000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2201 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:02.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623735653035616439626238336139346565313463343837343062 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2201 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:02.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623735653035616439626238336139346565313463343837343062 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit: BPF prog-id=115 op=LOAD Dec 13 14:37:02.524000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003e00d0 items=0 ppid=2201 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:02.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623735653035616439626238336139346565313463343837343062 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.524000 audit: BPF prog-id=116 op=LOAD Dec 13 14:37:02.524000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0003e0118 items=0 ppid=2201 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:02.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623735653035616439626238336139346565313463343837343062 Dec 13 14:37:02.525000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:37:02.525000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:02.525000 audit: BPF prog-id=117 op=LOAD Dec 13 14:37:02.525000 audit[2429]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0003e0528 items=0 ppid=2201 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:02.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233623735653035616439626238336139346565313463343837343062 Dec 13 14:37:02.537442 env[1267]: time="2024-12-13T14:37:02.537410497Z" level=info msg="StartContainer for \"b3b75e05ad9bb83a94ee14c48740b293f307f3de5dde269a7db11f3d0450d4e6\" returns successfully" Dec 13 14:37:02.682722 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3858659469.mount: Deactivated successfully. Dec 13 14:37:03.831630 kubelet[2106]: I1213 14:37:03.831539 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-t54wh" podStartSLOduration=2.506388438 podStartE2EDuration="5.831522657s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="2024-12-13 14:36:59.132628106 +0000 UTC m=+4.377155206" lastFinishedPulling="2024-12-13 14:37:02.457762326 +0000 UTC m=+7.702289425" observedRunningTime="2024-12-13 14:37:02.977872361 +0000 UTC m=+8.222399469" watchObservedRunningTime="2024-12-13 14:37:03.831522657 +0000 UTC m=+9.076049759" Dec 13 14:37:05.353000 audit[2462]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.356108 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:37:05.356218 kernel: audit: type=1325 audit(1734100625.353:930): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.353000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc2fbc3e40 a2=0 a3=7ffc2fbc3e2c items=0 ppid=2262 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.361973 kernel: audit: type=1300 audit(1734100625.353:930): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc2fbc3e40 a2=0 a3=7ffc2fbc3e2c items=0 ppid=2262 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.362007 kernel: audit: type=1327 audit(1734100625.353:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.364000 audit[2462]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.364000 audit[2462]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2fbc3e40 a2=0 a3=0 items=0 ppid=2262 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.371926 kernel: audit: type=1325 audit(1734100625.364:931): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.371955 kernel: audit: type=1300 audit(1734100625.364:931): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2fbc3e40 a2=0 a3=0 items=0 ppid=2262 pid=2462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.371975 kernel: audit: type=1327 audit(1734100625.364:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.375000 audit[2464]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.375000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdcf1ca050 a2=0 a3=7ffdcf1ca03c items=0 ppid=2262 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.383423 kernel: audit: type=1325 audit(1734100625.375:932): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.383455 kernel: audit: type=1300 audit(1734100625.375:932): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffdcf1ca050 a2=0 a3=7ffdcf1ca03c items=0 ppid=2262 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.386775 kernel: audit: type=1327 audit(1734100625.375:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.385000 audit[2464]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.385000 audit[2464]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdcf1ca050 a2=0 a3=0 items=0 ppid=2262 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:05.389788 kernel: audit: type=1325 audit(1734100625.385:933): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2464 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:05.517468 systemd[1]: Created slice kubepods-besteffort-pod3983adf1_64a0_4bd2_abd1_c45f09f81255.slice. Dec 13 14:37:05.582624 systemd[1]: Created slice kubepods-besteffort-podcf827bae_b749_4ffc_a34b_13b53b67ecfa.slice. Dec 13 14:37:05.608934 kubelet[2106]: I1213 14:37:05.608870 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-flexvol-driver-host\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.608934 kubelet[2106]: I1213 14:37:05.608917 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-policysync\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609158 kubelet[2106]: I1213 14:37:05.608936 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-net-dir\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609158 kubelet[2106]: I1213 14:37:05.608950 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6v9zg\" (UniqueName: \"kubernetes.io/projected/3983adf1-64a0-4bd2-abd1-c45f09f81255-kube-api-access-6v9zg\") pod \"calico-typha-5f7c5586cd-jb74r\" (UID: \"3983adf1-64a0-4bd2-abd1-c45f09f81255\") " pod="calico-system/calico-typha-5f7c5586cd-jb74r" Dec 13 14:37:05.609158 kubelet[2106]: I1213 14:37:05.608959 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-xtables-lock\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609158 kubelet[2106]: I1213 14:37:05.608998 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c4slc\" (UniqueName: \"kubernetes.io/projected/cf827bae-b749-4ffc-a34b-13b53b67ecfa-kube-api-access-c4slc\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609158 kubelet[2106]: I1213 14:37:05.609008 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-lib-calico\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609309 kubelet[2106]: I1213 14:37:05.609019 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/3983adf1-64a0-4bd2-abd1-c45f09f81255-typha-certs\") pod \"calico-typha-5f7c5586cd-jb74r\" (UID: \"3983adf1-64a0-4bd2-abd1-c45f09f81255\") " pod="calico-system/calico-typha-5f7c5586cd-jb74r" Dec 13 14:37:05.609309 kubelet[2106]: I1213 14:37:05.609027 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-lib-modules\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609309 kubelet[2106]: I1213 14:37:05.609035 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-log-dir\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609309 kubelet[2106]: I1213 14:37:05.609081 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cf827bae-b749-4ffc-a34b-13b53b67ecfa-node-certs\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609309 kubelet[2106]: I1213 14:37:05.609091 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-bin-dir\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609402 kubelet[2106]: I1213 14:37:05.609100 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-run-calico\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609402 kubelet[2106]: I1213 14:37:05.609109 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cf827bae-b749-4ffc-a34b-13b53b67ecfa-tigera-ca-bundle\") pod \"calico-node-s82f5\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " pod="calico-system/calico-node-s82f5" Dec 13 14:37:05.609402 kubelet[2106]: I1213 14:37:05.609143 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3983adf1-64a0-4bd2-abd1-c45f09f81255-tigera-ca-bundle\") pod \"calico-typha-5f7c5586cd-jb74r\" (UID: \"3983adf1-64a0-4bd2-abd1-c45f09f81255\") " pod="calico-system/calico-typha-5f7c5586cd-jb74r" Dec 13 14:37:05.731166 kubelet[2106]: E1213 14:37:05.731142 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.731166 kubelet[2106]: W1213 14:37:05.731160 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.731285 kubelet[2106]: E1213 14:37:05.731182 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.731322 kubelet[2106]: E1213 14:37:05.731296 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.731322 kubelet[2106]: W1213 14:37:05.731301 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.731322 kubelet[2106]: E1213 14:37:05.731308 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.731407 kubelet[2106]: E1213 14:37:05.731396 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.731407 kubelet[2106]: W1213 14:37:05.731400 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.731407 kubelet[2106]: E1213 14:37:05.731405 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.749017 kubelet[2106]: E1213 14:37:05.748526 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.749017 kubelet[2106]: W1213 14:37:05.748541 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.749017 kubelet[2106]: E1213 14:37:05.748560 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.750518 kubelet[2106]: E1213 14:37:05.750502 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.750636 kubelet[2106]: W1213 14:37:05.750622 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.750707 kubelet[2106]: E1213 14:37:05.750697 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.759899 kubelet[2106]: E1213 14:37:05.759837 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:05.796623 kubelet[2106]: E1213 14:37:05.796601 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.796623 kubelet[2106]: W1213 14:37:05.796616 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.796777 kubelet[2106]: E1213 14:37:05.796630 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.796777 kubelet[2106]: E1213 14:37:05.796715 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.796777 kubelet[2106]: W1213 14:37:05.796720 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.796777 kubelet[2106]: E1213 14:37:05.796727 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.796878 kubelet[2106]: E1213 14:37:05.796837 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.796878 kubelet[2106]: W1213 14:37:05.796843 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.796878 kubelet[2106]: E1213 14:37:05.796849 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.796962 kubelet[2106]: E1213 14:37:05.796927 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.796962 kubelet[2106]: W1213 14:37:05.796931 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.796962 kubelet[2106]: E1213 14:37:05.796938 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797054 kubelet[2106]: E1213 14:37:05.797042 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797054 kubelet[2106]: W1213 14:37:05.797052 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797130 kubelet[2106]: E1213 14:37:05.797059 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797159 kubelet[2106]: E1213 14:37:05.797134 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797159 kubelet[2106]: W1213 14:37:05.797139 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797159 kubelet[2106]: E1213 14:37:05.797143 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797233 kubelet[2106]: E1213 14:37:05.797218 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797233 kubelet[2106]: W1213 14:37:05.797223 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797233 kubelet[2106]: E1213 14:37:05.797228 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797306 kubelet[2106]: E1213 14:37:05.797296 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797306 kubelet[2106]: W1213 14:37:05.797302 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797362 kubelet[2106]: E1213 14:37:05.797308 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797396 kubelet[2106]: E1213 14:37:05.797387 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797396 kubelet[2106]: W1213 14:37:05.797393 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797442 kubelet[2106]: E1213 14:37:05.797397 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797482 kubelet[2106]: E1213 14:37:05.797472 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797482 kubelet[2106]: W1213 14:37:05.797480 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797542 kubelet[2106]: E1213 14:37:05.797486 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797566 kubelet[2106]: E1213 14:37:05.797560 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797566 kubelet[2106]: W1213 14:37:05.797564 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797601 kubelet[2106]: E1213 14:37:05.797568 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797659 kubelet[2106]: E1213 14:37:05.797650 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797659 kubelet[2106]: W1213 14:37:05.797658 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797727 kubelet[2106]: E1213 14:37:05.797666 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797778 kubelet[2106]: E1213 14:37:05.797767 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797778 kubelet[2106]: W1213 14:37:05.797775 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797855 kubelet[2106]: E1213 14:37:05.797781 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797889 kubelet[2106]: E1213 14:37:05.797857 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797889 kubelet[2106]: W1213 14:37:05.797863 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797889 kubelet[2106]: E1213 14:37:05.797869 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.797968 kubelet[2106]: E1213 14:37:05.797950 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.797968 kubelet[2106]: W1213 14:37:05.797955 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.797968 kubelet[2106]: E1213 14:37:05.797959 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.798050 kubelet[2106]: E1213 14:37:05.798041 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.798050 kubelet[2106]: W1213 14:37:05.798047 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.798111 kubelet[2106]: E1213 14:37:05.798052 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.798147 kubelet[2106]: E1213 14:37:05.798138 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.798147 kubelet[2106]: W1213 14:37:05.798145 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.798200 kubelet[2106]: E1213 14:37:05.798150 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.798239 kubelet[2106]: E1213 14:37:05.798230 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.798239 kubelet[2106]: W1213 14:37:05.798238 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.798293 kubelet[2106]: E1213 14:37:05.798243 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.798331 kubelet[2106]: E1213 14:37:05.798321 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.798331 kubelet[2106]: W1213 14:37:05.798329 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.798384 kubelet[2106]: E1213 14:37:05.798336 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.798412 kubelet[2106]: E1213 14:37:05.798408 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.798434 kubelet[2106]: W1213 14:37:05.798413 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.798434 kubelet[2106]: E1213 14:37:05.798418 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.811514 kubelet[2106]: E1213 14:37:05.811497 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.811634 kubelet[2106]: W1213 14:37:05.811621 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.811692 kubelet[2106]: E1213 14:37:05.811682 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.811777 kubelet[2106]: I1213 14:37:05.811765 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/137b900f-a1c0-406e-87c9-33eedf71f128-kubelet-dir\") pod \"csi-node-driver-rskds\" (UID: \"137b900f-a1c0-406e-87c9-33eedf71f128\") " pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:05.811973 kubelet[2106]: E1213 14:37:05.811956 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.812012 kubelet[2106]: W1213 14:37:05.811973 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.812012 kubelet[2106]: E1213 14:37:05.811987 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.812133 kubelet[2106]: E1213 14:37:05.812121 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.812133 kubelet[2106]: W1213 14:37:05.812130 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.812192 kubelet[2106]: E1213 14:37:05.812141 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.812292 kubelet[2106]: E1213 14:37:05.812270 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.812292 kubelet[2106]: W1213 14:37:05.812279 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.812587 kubelet[2106]: E1213 14:37:05.812295 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.812587 kubelet[2106]: I1213 14:37:05.812313 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-995d6\" (UniqueName: \"kubernetes.io/projected/137b900f-a1c0-406e-87c9-33eedf71f128-kube-api-access-995d6\") pod \"csi-node-driver-rskds\" (UID: \"137b900f-a1c0-406e-87c9-33eedf71f128\") " pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:05.812587 kubelet[2106]: E1213 14:37:05.812405 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.812587 kubelet[2106]: W1213 14:37:05.812418 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.812587 kubelet[2106]: E1213 14:37:05.812425 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.812587 kubelet[2106]: I1213 14:37:05.812434 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/137b900f-a1c0-406e-87c9-33eedf71f128-socket-dir\") pod \"csi-node-driver-rskds\" (UID: \"137b900f-a1c0-406e-87c9-33eedf71f128\") " pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:05.812739 kubelet[2106]: E1213 14:37:05.812666 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.812739 kubelet[2106]: W1213 14:37:05.812674 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.812739 kubelet[2106]: E1213 14:37:05.812687 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.812739 kubelet[2106]: I1213 14:37:05.812701 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/137b900f-a1c0-406e-87c9-33eedf71f128-registration-dir\") pod \"csi-node-driver-rskds\" (UID: \"137b900f-a1c0-406e-87c9-33eedf71f128\") " pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:05.813795 kubelet[2106]: E1213 14:37:05.813753 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.813795 kubelet[2106]: W1213 14:37:05.813766 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.813795 kubelet[2106]: E1213 14:37:05.813781 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.813888 kubelet[2106]: I1213 14:37:05.813797 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/137b900f-a1c0-406e-87c9-33eedf71f128-varrun\") pod \"csi-node-driver-rskds\" (UID: \"137b900f-a1c0-406e-87c9-33eedf71f128\") " pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:05.813954 kubelet[2106]: E1213 14:37:05.813932 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.813954 kubelet[2106]: W1213 14:37:05.813942 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.814046 kubelet[2106]: E1213 14:37:05.814035 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.814173 kubelet[2106]: E1213 14:37:05.814160 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.814173 kubelet[2106]: W1213 14:37:05.814171 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.814262 kubelet[2106]: E1213 14:37:05.814254 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.814313 kubelet[2106]: E1213 14:37:05.814282 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.814367 kubelet[2106]: W1213 14:37:05.814357 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.814457 kubelet[2106]: E1213 14:37:05.814443 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.814591 kubelet[2106]: E1213 14:37:05.814584 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.814644 kubelet[2106]: W1213 14:37:05.814636 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.814796 kubelet[2106]: E1213 14:37:05.814782 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.814941 kubelet[2106]: E1213 14:37:05.814933 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.815000 kubelet[2106]: W1213 14:37:05.814992 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.815056 kubelet[2106]: E1213 14:37:05.815048 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.815208 kubelet[2106]: E1213 14:37:05.815202 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.815265 kubelet[2106]: W1213 14:37:05.815257 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.815309 kubelet[2106]: E1213 14:37:05.815301 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.815449 kubelet[2106]: E1213 14:37:05.815443 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.815504 kubelet[2106]: W1213 14:37:05.815494 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.815557 kubelet[2106]: E1213 14:37:05.815548 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.815708 kubelet[2106]: E1213 14:37:05.815702 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.815778 kubelet[2106]: W1213 14:37:05.815770 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.815865 kubelet[2106]: E1213 14:37:05.815857 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.825127 env[1267]: time="2024-12-13T14:37:05.824783617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5f7c5586cd-jb74r,Uid:3983adf1-64a0-4bd2-abd1-c45f09f81255,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:05.874447 env[1267]: time="2024-12-13T14:37:05.874373525Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:05.874558 env[1267]: time="2024-12-13T14:37:05.874543144Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:05.874759 env[1267]: time="2024-12-13T14:37:05.874735639Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:05.877430 env[1267]: time="2024-12-13T14:37:05.877398013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5982f17e26a8a2d72a208e13c4a107992827b14534f2a452ba873614be8cdbd0 pid=2519 runtime=io.containerd.runc.v2 Dec 13 14:37:05.885132 env[1267]: time="2024-12-13T14:37:05.885107629Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s82f5,Uid:cf827bae-b749-4ffc-a34b-13b53b67ecfa,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:05.889863 systemd[1]: Started cri-containerd-5982f17e26a8a2d72a208e13c4a107992827b14534f2a452ba873614be8cdbd0.scope. Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.900000 audit: BPF prog-id=118 op=LOAD Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2519 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383266313765323661386132643732613230386531336334613130 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2519 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383266313765323661386132643732613230386531336334613130 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit: BPF prog-id=119 op=LOAD Dec 13 14:37:05.901000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00029fb00 items=0 ppid=2519 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383266313765323661386132643732613230386531336334613130 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit: BPF prog-id=120 op=LOAD Dec 13 14:37:05.901000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00029fb48 items=0 ppid=2519 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383266313765323661386132643732613230386531336334613130 Dec 13 14:37:05.901000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:37:05.901000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { perfmon } for pid=2530 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit[2530]: AVC avc: denied { bpf } for pid=2530 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.901000 audit: BPF prog-id=121 op=LOAD Dec 13 14:37:05.901000 audit[2530]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00029ff58 items=0 ppid=2519 pid=2530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539383266313765323661386132643732613230386531336334613130 Dec 13 14:37:05.914206 kubelet[2106]: E1213 14:37:05.914115 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914206 kubelet[2106]: W1213 14:37:05.914127 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914206 kubelet[2106]: E1213 14:37:05.914139 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914410 kubelet[2106]: E1213 14:37:05.914362 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914410 kubelet[2106]: W1213 14:37:05.914368 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914410 kubelet[2106]: E1213 14:37:05.914377 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914497 kubelet[2106]: E1213 14:37:05.914466 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914497 kubelet[2106]: W1213 14:37:05.914472 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914497 kubelet[2106]: E1213 14:37:05.914483 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914573 kubelet[2106]: E1213 14:37:05.914557 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914573 kubelet[2106]: W1213 14:37:05.914564 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914573 kubelet[2106]: E1213 14:37:05.914568 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914655 kubelet[2106]: E1213 14:37:05.914639 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914655 kubelet[2106]: W1213 14:37:05.914643 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914655 kubelet[2106]: E1213 14:37:05.914647 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914757 kubelet[2106]: E1213 14:37:05.914741 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914757 kubelet[2106]: W1213 14:37:05.914755 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914891 kubelet[2106]: E1213 14:37:05.914764 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914891 kubelet[2106]: E1213 14:37:05.914842 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914891 kubelet[2106]: W1213 14:37:05.914847 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914891 kubelet[2106]: E1213 14:37:05.914856 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.914982 kubelet[2106]: E1213 14:37:05.914937 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.914982 kubelet[2106]: W1213 14:37:05.914942 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.914982 kubelet[2106]: E1213 14:37:05.914947 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915040 kubelet[2106]: E1213 14:37:05.915020 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915040 kubelet[2106]: W1213 14:37:05.915025 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915040 kubelet[2106]: E1213 14:37:05.915029 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915123 kubelet[2106]: E1213 14:37:05.915107 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915123 kubelet[2106]: W1213 14:37:05.915113 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915123 kubelet[2106]: E1213 14:37:05.915121 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915213 kubelet[2106]: E1213 14:37:05.915187 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915213 kubelet[2106]: W1213 14:37:05.915191 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915213 kubelet[2106]: E1213 14:37:05.915195 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915272 kubelet[2106]: E1213 14:37:05.915257 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915272 kubelet[2106]: W1213 14:37:05.915262 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915272 kubelet[2106]: E1213 14:37:05.915266 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915353 kubelet[2106]: E1213 14:37:05.915344 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915353 kubelet[2106]: W1213 14:37:05.915350 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915421 kubelet[2106]: E1213 14:37:05.915357 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915444 kubelet[2106]: E1213 14:37:05.915427 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915444 kubelet[2106]: W1213 14:37:05.915431 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915444 kubelet[2106]: E1213 14:37:05.915436 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915508 kubelet[2106]: E1213 14:37:05.915498 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915508 kubelet[2106]: W1213 14:37:05.915504 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915508 kubelet[2106]: E1213 14:37:05.915508 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915592 kubelet[2106]: E1213 14:37:05.915572 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915592 kubelet[2106]: W1213 14:37:05.915576 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915592 kubelet[2106]: E1213 14:37:05.915580 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.915829 kubelet[2106]: E1213 14:37:05.915764 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.915829 kubelet[2106]: W1213 14:37:05.915770 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.915829 kubelet[2106]: E1213 14:37:05.915780 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916005 kubelet[2106]: E1213 14:37:05.915944 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916005 kubelet[2106]: W1213 14:37:05.915949 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916005 kubelet[2106]: E1213 14:37:05.915957 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916179 kubelet[2106]: E1213 14:37:05.916106 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916179 kubelet[2106]: W1213 14:37:05.916112 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916179 kubelet[2106]: E1213 14:37:05.916117 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916326 kubelet[2106]: E1213 14:37:05.916281 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916326 kubelet[2106]: W1213 14:37:05.916287 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916326 kubelet[2106]: E1213 14:37:05.916300 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916522 kubelet[2106]: E1213 14:37:05.916466 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916522 kubelet[2106]: W1213 14:37:05.916471 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916522 kubelet[2106]: E1213 14:37:05.916481 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916669 kubelet[2106]: E1213 14:37:05.916622 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916669 kubelet[2106]: W1213 14:37:05.916628 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916669 kubelet[2106]: E1213 14:37:05.916633 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916861 kubelet[2106]: E1213 14:37:05.916776 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916861 kubelet[2106]: W1213 14:37:05.916780 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916861 kubelet[2106]: E1213 14:37:05.916785 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.916986 kubelet[2106]: E1213 14:37:05.916963 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.916986 kubelet[2106]: W1213 14:37:05.916969 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.916986 kubelet[2106]: E1213 14:37:05.916974 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.922842 kubelet[2106]: E1213 14:37:05.921100 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.922842 kubelet[2106]: W1213 14:37:05.921112 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.922842 kubelet[2106]: E1213 14:37:05.921121 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.923287 kubelet[2106]: E1213 14:37:05.923258 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:05.923287 kubelet[2106]: W1213 14:37:05.923265 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:05.923287 kubelet[2106]: E1213 14:37:05.923272 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:05.929048 env[1267]: time="2024-12-13T14:37:05.929022566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5f7c5586cd-jb74r,Uid:3983adf1-64a0-4bd2-abd1-c45f09f81255,Namespace:calico-system,Attempt:0,} returns sandbox id \"5982f17e26a8a2d72a208e13c4a107992827b14534f2a452ba873614be8cdbd0\"" Dec 13 14:37:05.937629 env[1267]: time="2024-12-13T14:37:05.937160193Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:37:05.937629 env[1267]: time="2024-12-13T14:37:05.937205620Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:37:05.937629 env[1267]: time="2024-12-13T14:37:05.937232554Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:37:05.937629 env[1267]: time="2024-12-13T14:37:05.937329116Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408 pid=2585 runtime=io.containerd.runc.v2 Dec 13 14:37:05.950166 systemd[1]: Started cri-containerd-687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408.scope. Dec 13 14:37:05.959788 env[1267]: time="2024-12-13T14:37:05.958663123Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.965000 audit: BPF prog-id=122 op=LOAD Dec 13 14:37:05.966000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.966000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638376562636538376464323530306537356432333830383762636232 Dec 13 14:37:05.966000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.966000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638376562636538376464323530306537356432333830383762636232 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.967000 audit: BPF prog-id=123 op=LOAD Dec 13 14:37:05.967000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000288de0 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.967000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638376562636538376464323530306537356432333830383762636232 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit: BPF prog-id=124 op=LOAD Dec 13 14:37:05.968000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000288e28 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638376562636538376464323530306537356432333830383762636232 Dec 13 14:37:05.968000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:37:05.968000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:05.968000 audit: BPF prog-id=125 op=LOAD Dec 13 14:37:05.968000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000289238 items=0 ppid=2585 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:05.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638376562636538376464323530306537356432333830383762636232 Dec 13 14:37:05.985680 env[1267]: time="2024-12-13T14:37:05.985650470Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-s82f5,Uid:cf827bae-b749-4ffc-a34b-13b53b67ecfa,Namespace:calico-system,Attempt:0,} returns sandbox id \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\"" Dec 13 14:37:06.391000 audit[2621]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:06.391000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffdba28c600 a2=0 a3=7ffdba28c5ec items=0 ppid=2262 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:06.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:06.395000 audit[2621]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:06.395000 audit[2621]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdba28c600 a2=0 a3=0 items=0 ppid=2262 pid=2621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:06.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:06.972624 kubelet[2106]: E1213 14:37:06.972597 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:07.470823 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2892268434.mount: Deactivated successfully. Dec 13 14:37:08.249285 env[1267]: time="2024-12-13T14:37:08.249260524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:08.256732 env[1267]: time="2024-12-13T14:37:08.256714564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:08.261842 env[1267]: time="2024-12-13T14:37:08.261760785Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:08.266867 env[1267]: time="2024-12-13T14:37:08.266850895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:08.267095 env[1267]: time="2024-12-13T14:37:08.267078849Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 14:37:08.267730 env[1267]: time="2024-12-13T14:37:08.267710706Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:37:08.281191 env[1267]: time="2024-12-13T14:37:08.281162245Z" level=info msg="CreateContainer within sandbox \"5982f17e26a8a2d72a208e13c4a107992827b14534f2a452ba873614be8cdbd0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:37:08.292119 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1760822561.mount: Deactivated successfully. Dec 13 14:37:08.295305 env[1267]: time="2024-12-13T14:37:08.295267819Z" level=info msg="CreateContainer within sandbox \"5982f17e26a8a2d72a208e13c4a107992827b14534f2a452ba873614be8cdbd0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"29c4c07253b82579f3eb663e2ba123557b2c3c07faaebe89689a5fabf67e4269\"" Dec 13 14:37:08.296703 env[1267]: time="2024-12-13T14:37:08.296666778Z" level=info msg="StartContainer for \"29c4c07253b82579f3eb663e2ba123557b2c3c07faaebe89689a5fabf67e4269\"" Dec 13 14:37:08.310658 systemd[1]: Started cri-containerd-29c4c07253b82579f3eb663e2ba123557b2c3c07faaebe89689a5fabf67e4269.scope. Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.325000 audit: BPF prog-id=126 op=LOAD Dec 13 14:37:08.325000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.325000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2519 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239633463303732353362383235373966336562363633653262613132 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2519 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239633463303732353362383235373966336562363633653262613132 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.326000 audit: BPF prog-id=127 op=LOAD Dec 13 14:37:08.326000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00037d260 items=0 ppid=2519 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239633463303732353362383235373966336562363633653262613132 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit: BPF prog-id=128 op=LOAD Dec 13 14:37:08.327000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00037d2a8 items=0 ppid=2519 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239633463303732353362383235373966336562363633653262613132 Dec 13 14:37:08.327000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:37:08.327000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { perfmon } for pid=2632 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit[2632]: AVC avc: denied { bpf } for pid=2632 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:08.327000 audit: BPF prog-id=129 op=LOAD Dec 13 14:37:08.327000 audit[2632]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00037d6b8 items=0 ppid=2519 pid=2632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:08.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239633463303732353362383235373966336562363633653262613132 Dec 13 14:37:08.350446 env[1267]: time="2024-12-13T14:37:08.350421588Z" level=info msg="StartContainer for \"29c4c07253b82579f3eb663e2ba123557b2c3c07faaebe89689a5fabf67e4269\" returns successfully" Dec 13 14:37:08.525784 kubelet[2106]: E1213 14:37:08.525696 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.525784 kubelet[2106]: W1213 14:37:08.525716 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.525784 kubelet[2106]: E1213 14:37:08.525733 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526099 kubelet[2106]: E1213 14:37:08.525874 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526099 kubelet[2106]: W1213 14:37:08.525881 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526099 kubelet[2106]: E1213 14:37:08.525887 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526099 kubelet[2106]: E1213 14:37:08.525988 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526099 kubelet[2106]: W1213 14:37:08.525994 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526099 kubelet[2106]: E1213 14:37:08.526002 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526264 kubelet[2106]: E1213 14:37:08.526102 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526264 kubelet[2106]: W1213 14:37:08.526108 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526264 kubelet[2106]: E1213 14:37:08.526115 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526264 kubelet[2106]: E1213 14:37:08.526213 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526264 kubelet[2106]: W1213 14:37:08.526218 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526264 kubelet[2106]: E1213 14:37:08.526224 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526426 kubelet[2106]: E1213 14:37:08.526313 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526426 kubelet[2106]: W1213 14:37:08.526318 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526426 kubelet[2106]: E1213 14:37:08.526324 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526426 kubelet[2106]: E1213 14:37:08.526414 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526426 kubelet[2106]: W1213 14:37:08.526419 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526426 kubelet[2106]: E1213 14:37:08.526425 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526598 kubelet[2106]: E1213 14:37:08.526515 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526598 kubelet[2106]: W1213 14:37:08.526521 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526598 kubelet[2106]: E1213 14:37:08.526527 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526672 kubelet[2106]: E1213 14:37:08.526622 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526672 kubelet[2106]: W1213 14:37:08.526628 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526672 kubelet[2106]: E1213 14:37:08.526633 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526785 kubelet[2106]: E1213 14:37:08.526720 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526785 kubelet[2106]: W1213 14:37:08.526726 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526785 kubelet[2106]: E1213 14:37:08.526732 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526883 kubelet[2106]: E1213 14:37:08.526832 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526883 kubelet[2106]: W1213 14:37:08.526838 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526883 kubelet[2106]: E1213 14:37:08.526844 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.526958 kubelet[2106]: E1213 14:37:08.526932 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.526958 kubelet[2106]: W1213 14:37:08.526937 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.526958 kubelet[2106]: E1213 14:37:08.526943 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527032 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528559 kubelet[2106]: W1213 14:37:08.527041 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527046 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527131 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528559 kubelet[2106]: W1213 14:37:08.527143 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527150 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527241 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528559 kubelet[2106]: W1213 14:37:08.527246 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527252 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528559 kubelet[2106]: E1213 14:37:08.527444 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528849 kubelet[2106]: W1213 14:37:08.527450 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.527486 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.527659 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528849 kubelet[2106]: W1213 14:37:08.527665 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.527671 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.527845 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528849 kubelet[2106]: W1213 14:37:08.527871 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.527879 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.528849 kubelet[2106]: E1213 14:37:08.528034 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.528849 kubelet[2106]: W1213 14:37:08.528041 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528047 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528241 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529271 kubelet[2106]: W1213 14:37:08.528247 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528254 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528421 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529271 kubelet[2106]: W1213 14:37:08.528427 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528433 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528578 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529271 kubelet[2106]: W1213 14:37:08.528584 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529271 kubelet[2106]: E1213 14:37:08.528590 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528682 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529539 kubelet[2106]: W1213 14:37:08.528688 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528694 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528797 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529539 kubelet[2106]: W1213 14:37:08.528803 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528810 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528917 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:08.529539 kubelet[2106]: W1213 14:37:08.528924 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:08.529539 kubelet[2106]: E1213 14:37:08.528930 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:08.943937 kubelet[2106]: E1213 14:37:08.942994 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:09.033402 kubelet[2106]: E1213 14:37:09.033383 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.033525 kubelet[2106]: W1213 14:37:09.033512 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.033591 kubelet[2106]: E1213 14:37:09.033578 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.033741 kubelet[2106]: E1213 14:37:09.033734 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.033808 kubelet[2106]: W1213 14:37:09.033799 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.033857 kubelet[2106]: E1213 14:37:09.033848 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.034029 kubelet[2106]: E1213 14:37:09.034022 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.034080 kubelet[2106]: W1213 14:37:09.034072 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.034126 kubelet[2106]: E1213 14:37:09.034118 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.034269 kubelet[2106]: E1213 14:37:09.034263 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.034318 kubelet[2106]: W1213 14:37:09.034310 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.034366 kubelet[2106]: E1213 14:37:09.034359 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.034532 kubelet[2106]: E1213 14:37:09.034525 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.034597 kubelet[2106]: W1213 14:37:09.034589 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.034643 kubelet[2106]: E1213 14:37:09.034635 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.034784 kubelet[2106]: E1213 14:37:09.034777 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.034829 kubelet[2106]: W1213 14:37:09.034821 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.034905 kubelet[2106]: E1213 14:37:09.034897 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.035050 kubelet[2106]: E1213 14:37:09.035043 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.035100 kubelet[2106]: W1213 14:37:09.035092 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.035148 kubelet[2106]: E1213 14:37:09.035140 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.035280 kubelet[2106]: E1213 14:37:09.035274 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.035326 kubelet[2106]: W1213 14:37:09.035318 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.035374 kubelet[2106]: E1213 14:37:09.035366 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.035523 kubelet[2106]: E1213 14:37:09.035517 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.035572 kubelet[2106]: W1213 14:37:09.035564 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.035617 kubelet[2106]: E1213 14:37:09.035609 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.035758 kubelet[2106]: E1213 14:37:09.035743 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.035802 kubelet[2106]: W1213 14:37:09.035793 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.035846 kubelet[2106]: E1213 14:37:09.035839 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.035993 kubelet[2106]: E1213 14:37:09.035988 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.036041 kubelet[2106]: W1213 14:37:09.036033 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.036088 kubelet[2106]: E1213 14:37:09.036081 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.036228 kubelet[2106]: E1213 14:37:09.036222 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.036275 kubelet[2106]: W1213 14:37:09.036267 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.036324 kubelet[2106]: E1213 14:37:09.036315 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.036487 kubelet[2106]: E1213 14:37:09.036481 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.036533 kubelet[2106]: W1213 14:37:09.036525 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.036580 kubelet[2106]: E1213 14:37:09.036572 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.036712 kubelet[2106]: E1213 14:37:09.036706 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.036767 kubelet[2106]: W1213 14:37:09.036758 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.036813 kubelet[2106]: E1213 14:37:09.036804 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.036947 kubelet[2106]: E1213 14:37:09.036941 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.036996 kubelet[2106]: W1213 14:37:09.036988 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.037045 kubelet[2106]: E1213 14:37:09.037038 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.037230 kubelet[2106]: E1213 14:37:09.037224 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.037278 kubelet[2106]: W1213 14:37:09.037269 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.037325 kubelet[2106]: E1213 14:37:09.037318 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.037470 kubelet[2106]: E1213 14:37:09.037464 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.037518 kubelet[2106]: W1213 14:37:09.037510 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.037570 kubelet[2106]: E1213 14:37:09.037563 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.037735 kubelet[2106]: E1213 14:37:09.037729 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.037800 kubelet[2106]: W1213 14:37:09.037791 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.037853 kubelet[2106]: E1213 14:37:09.037847 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038001 kubelet[2106]: E1213 14:37:09.037994 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038049 kubelet[2106]: W1213 14:37:09.038040 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038101 kubelet[2106]: E1213 14:37:09.038094 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038207 kubelet[2106]: E1213 14:37:09.038194 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038207 kubelet[2106]: W1213 14:37:09.038206 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038267 kubelet[2106]: E1213 14:37:09.038217 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038311 kubelet[2106]: E1213 14:37:09.038300 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038311 kubelet[2106]: W1213 14:37:09.038308 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038402 kubelet[2106]: E1213 14:37:09.038313 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038402 kubelet[2106]: E1213 14:37:09.038388 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038402 kubelet[2106]: W1213 14:37:09.038392 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038402 kubelet[2106]: E1213 14:37:09.038397 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038498 kubelet[2106]: E1213 14:37:09.038486 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038498 kubelet[2106]: W1213 14:37:09.038494 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038556 kubelet[2106]: E1213 14:37:09.038503 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038707 kubelet[2106]: E1213 14:37:09.038698 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038707 kubelet[2106]: W1213 14:37:09.038706 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038776 kubelet[2106]: E1213 14:37:09.038715 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038821 kubelet[2106]: E1213 14:37:09.038811 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038821 kubelet[2106]: W1213 14:37:09.038818 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038886 kubelet[2106]: E1213 14:37:09.038827 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.038911 kubelet[2106]: E1213 14:37:09.038907 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.038934 kubelet[2106]: W1213 14:37:09.038912 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.038934 kubelet[2106]: E1213 14:37:09.038919 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039007 kubelet[2106]: E1213 14:37:09.038996 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039049 kubelet[2106]: W1213 14:37:09.039008 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039049 kubelet[2106]: E1213 14:37:09.039017 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039112 kubelet[2106]: E1213 14:37:09.039099 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039112 kubelet[2106]: W1213 14:37:09.039108 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039171 kubelet[2106]: E1213 14:37:09.039118 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039284 kubelet[2106]: E1213 14:37:09.039277 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039333 kubelet[2106]: W1213 14:37:09.039325 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039384 kubelet[2106]: E1213 14:37:09.039377 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039510 kubelet[2106]: E1213 14:37:09.039504 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039560 kubelet[2106]: W1213 14:37:09.039552 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039610 kubelet[2106]: E1213 14:37:09.039602 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039699 kubelet[2106]: E1213 14:37:09.039688 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039699 kubelet[2106]: W1213 14:37:09.039696 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039819 kubelet[2106]: E1213 14:37:09.039702 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.039843 kubelet[2106]: E1213 14:37:09.039821 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.039843 kubelet[2106]: W1213 14:37:09.039828 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.039843 kubelet[2106]: E1213 14:37:09.039833 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.040020 kubelet[2106]: E1213 14:37:09.040011 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:09.040020 kubelet[2106]: W1213 14:37:09.040019 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:09.040073 kubelet[2106]: E1213 14:37:09.040023 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:09.992999 kubelet[2106]: I1213 14:37:09.992980 2106 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:10.041185 kubelet[2106]: E1213 14:37:10.041167 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.041288 kubelet[2106]: W1213 14:37:10.041275 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.041345 kubelet[2106]: E1213 14:37:10.041330 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.041513 kubelet[2106]: E1213 14:37:10.041506 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.041562 kubelet[2106]: W1213 14:37:10.041554 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.041607 kubelet[2106]: E1213 14:37:10.041599 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.041772 kubelet[2106]: E1213 14:37:10.041766 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.041832 kubelet[2106]: W1213 14:37:10.041825 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.041877 kubelet[2106]: E1213 14:37:10.041870 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.042029 kubelet[2106]: E1213 14:37:10.042023 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.042106 kubelet[2106]: W1213 14:37:10.042099 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.042159 kubelet[2106]: E1213 14:37:10.042151 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.042326 kubelet[2106]: E1213 14:37:10.042320 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.042382 kubelet[2106]: W1213 14:37:10.042375 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.042426 kubelet[2106]: E1213 14:37:10.042419 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.042606 kubelet[2106]: E1213 14:37:10.042600 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.042650 kubelet[2106]: W1213 14:37:10.042642 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.042696 kubelet[2106]: E1213 14:37:10.042689 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.042826 kubelet[2106]: E1213 14:37:10.042821 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.042873 kubelet[2106]: W1213 14:37:10.042865 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.042920 kubelet[2106]: E1213 14:37:10.042911 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.043056 kubelet[2106]: E1213 14:37:10.043051 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.043101 kubelet[2106]: W1213 14:37:10.043093 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.043147 kubelet[2106]: E1213 14:37:10.043139 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.043291 kubelet[2106]: E1213 14:37:10.043285 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.043334 kubelet[2106]: W1213 14:37:10.043326 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.043378 kubelet[2106]: E1213 14:37:10.043370 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.043509 kubelet[2106]: E1213 14:37:10.043503 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.043554 kubelet[2106]: W1213 14:37:10.043546 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.043597 kubelet[2106]: E1213 14:37:10.043590 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.043720 kubelet[2106]: E1213 14:37:10.043714 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.043791 kubelet[2106]: W1213 14:37:10.043782 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.043853 kubelet[2106]: E1213 14:37:10.043844 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.044015 kubelet[2106]: E1213 14:37:10.044009 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.044061 kubelet[2106]: W1213 14:37:10.044053 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.044106 kubelet[2106]: E1213 14:37:10.044098 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.044240 kubelet[2106]: E1213 14:37:10.044235 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.044283 kubelet[2106]: W1213 14:37:10.044275 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.044329 kubelet[2106]: E1213 14:37:10.044322 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.044461 kubelet[2106]: E1213 14:37:10.044454 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.044507 kubelet[2106]: W1213 14:37:10.044500 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.044550 kubelet[2106]: E1213 14:37:10.044543 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.044672 kubelet[2106]: E1213 14:37:10.044666 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.044717 kubelet[2106]: W1213 14:37:10.044710 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.044779 kubelet[2106]: E1213 14:37:10.044772 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142221 kubelet[2106]: E1213 14:37:10.142197 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142221 kubelet[2106]: W1213 14:37:10.142211 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142221 kubelet[2106]: E1213 14:37:10.142224 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142362 kubelet[2106]: E1213 14:37:10.142336 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142362 kubelet[2106]: W1213 14:37:10.142341 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142362 kubelet[2106]: E1213 14:37:10.142346 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142453 kubelet[2106]: E1213 14:37:10.142441 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142485 kubelet[2106]: W1213 14:37:10.142454 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142485 kubelet[2106]: E1213 14:37:10.142460 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142563 kubelet[2106]: E1213 14:37:10.142552 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142563 kubelet[2106]: W1213 14:37:10.142560 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142621 kubelet[2106]: E1213 14:37:10.142567 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142645 kubelet[2106]: E1213 14:37:10.142640 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142666 kubelet[2106]: W1213 14:37:10.142645 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142666 kubelet[2106]: E1213 14:37:10.142650 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142725 kubelet[2106]: E1213 14:37:10.142714 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142725 kubelet[2106]: W1213 14:37:10.142721 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142725 kubelet[2106]: E1213 14:37:10.142726 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.142824 kubelet[2106]: E1213 14:37:10.142812 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.142824 kubelet[2106]: W1213 14:37:10.142821 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.142874 kubelet[2106]: E1213 14:37:10.142830 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143118 kubelet[2106]: E1213 14:37:10.143107 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143118 kubelet[2106]: W1213 14:37:10.143115 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143179 kubelet[2106]: E1213 14:37:10.143124 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143219 kubelet[2106]: E1213 14:37:10.143211 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143219 kubelet[2106]: W1213 14:37:10.143217 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143274 kubelet[2106]: E1213 14:37:10.143223 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143312 kubelet[2106]: E1213 14:37:10.143300 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143340 kubelet[2106]: W1213 14:37:10.143309 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143340 kubelet[2106]: E1213 14:37:10.143319 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143407 kubelet[2106]: E1213 14:37:10.143398 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143407 kubelet[2106]: W1213 14:37:10.143405 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143460 kubelet[2106]: E1213 14:37:10.143412 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143504 kubelet[2106]: E1213 14:37:10.143493 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143504 kubelet[2106]: W1213 14:37:10.143500 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143552 kubelet[2106]: E1213 14:37:10.143510 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143679 kubelet[2106]: E1213 14:37:10.143669 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143679 kubelet[2106]: W1213 14:37:10.143676 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143756 kubelet[2106]: E1213 14:37:10.143740 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.143810 kubelet[2106]: E1213 14:37:10.143760 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.143855 kubelet[2106]: W1213 14:37:10.143846 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.143901 kubelet[2106]: E1213 14:37:10.143893 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.144049 kubelet[2106]: E1213 14:37:10.144042 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.144094 kubelet[2106]: W1213 14:37:10.144086 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.144138 kubelet[2106]: E1213 14:37:10.144131 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.144268 kubelet[2106]: E1213 14:37:10.144262 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.144312 kubelet[2106]: W1213 14:37:10.144304 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.144357 kubelet[2106]: E1213 14:37:10.144350 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.144498 kubelet[2106]: E1213 14:37:10.144492 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.144542 kubelet[2106]: W1213 14:37:10.144534 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.144585 kubelet[2106]: E1213 14:37:10.144578 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.144915 kubelet[2106]: E1213 14:37:10.144908 2106 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:37:10.144965 kubelet[2106]: W1213 14:37:10.144957 2106 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:37:10.145010 kubelet[2106]: E1213 14:37:10.145002 2106 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:37:10.658935 env[1267]: time="2024-12-13T14:37:10.658895717Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.684512 env[1267]: time="2024-12-13T14:37:10.684476159Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.696074 env[1267]: time="2024-12-13T14:37:10.696040045Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.710832 env[1267]: time="2024-12-13T14:37:10.710796977Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:10.711529 env[1267]: time="2024-12-13T14:37:10.711513416Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 14:37:10.713272 env[1267]: time="2024-12-13T14:37:10.713253241Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:37:10.821924 env[1267]: time="2024-12-13T14:37:10.821889937Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\"" Dec 13 14:37:10.822583 env[1267]: time="2024-12-13T14:37:10.822566247Z" level=info msg="StartContainer for \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\"" Dec 13 14:37:10.838170 systemd[1]: Started cri-containerd-7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e.scope. Dec 13 14:37:10.856043 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:37:10.856109 kernel: audit: type=1400 audit(1734100630.850:990): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fee736fd108 items=0 ppid=2585 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:10.860430 kernel: audit: type=1300 audit(1734100630.850:990): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fee736fd108 items=0 ppid=2585 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:10.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343164396337393036663333306232636566393139396439333639 Dec 13 14:37:10.864153 kernel: audit: type=1327 audit(1734100630.850:990): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343164396337393036663333306232636566393139396439333639 Dec 13 14:37:10.864234 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.869087 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.875024 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.875076 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.880806 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.891342 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.891376 kernel: audit: type=1400 audit(1734100630.850:991): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.850000 audit: BPF prog-id=130 op=LOAD Dec 13 14:37:10.850000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002d5c88 items=0 ppid=2585 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:10.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343164396337393036663333306232636566393139396439333639 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit: BPF prog-id=131 op=LOAD Dec 13 14:37:10.851000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002d5cd8 items=0 ppid=2585 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343164396337393036663333306232636566393139396439333639 Dec 13 14:37:10.851000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:37:10.851000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:10.851000 audit: BPF prog-id=132 op=LOAD Dec 13 14:37:10.851000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002d5d68 items=0 ppid=2585 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:10.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766343164396337393036663333306232636566393139396439333639 Dec 13 14:37:10.891833 systemd[1]: cri-containerd-7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e.scope: Deactivated successfully. Dec 13 14:37:10.893000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:37:10.897573 env[1267]: time="2024-12-13T14:37:10.897544288Z" level=info msg="StartContainer for \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\" returns successfully" Dec 13 14:37:10.910053 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e-rootfs.mount: Deactivated successfully. Dec 13 14:37:10.943588 kubelet[2106]: E1213 14:37:10.942784 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:10.982088 env[1267]: time="2024-12-13T14:37:10.982051758Z" level=info msg="shim disconnected" id=7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e Dec 13 14:37:10.982088 env[1267]: time="2024-12-13T14:37:10.982084791Z" level=warning msg="cleaning up after shim disconnected" id=7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e namespace=k8s.io Dec 13 14:37:10.982088 env[1267]: time="2024-12-13T14:37:10.982093162Z" level=info msg="cleaning up dead shim" Dec 13 14:37:10.988041 env[1267]: time="2024-12-13T14:37:10.988014593Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:10Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2802 runtime=io.containerd.runc.v2\n" Dec 13 14:37:10.996054 env[1267]: time="2024-12-13T14:37:10.996028835Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:37:11.010807 kubelet[2106]: I1213 14:37:11.009485 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-5f7c5586cd-jb74r" podStartSLOduration=3.700316899 podStartE2EDuration="6.009462933s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:37:05.958408351 +0000 UTC m=+11.202935447" lastFinishedPulling="2024-12-13 14:37:08.267554382 +0000 UTC m=+13.512081481" observedRunningTime="2024-12-13 14:37:09.007004964 +0000 UTC m=+14.251532066" watchObservedRunningTime="2024-12-13 14:37:11.009462933 +0000 UTC m=+16.253990048" Dec 13 14:37:12.943890 kubelet[2106]: E1213 14:37:12.943651 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:14.868204 env[1267]: time="2024-12-13T14:37:14.868180410Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:14.870492 env[1267]: time="2024-12-13T14:37:14.870477235Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:14.871592 env[1267]: time="2024-12-13T14:37:14.871579823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:14.872165 env[1267]: time="2024-12-13T14:37:14.872152589Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:14.872480 env[1267]: time="2024-12-13T14:37:14.872468021Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 14:37:14.874098 env[1267]: time="2024-12-13T14:37:14.874079668Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:37:14.880581 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1223798200.mount: Deactivated successfully. Dec 13 14:37:14.889357 env[1267]: time="2024-12-13T14:37:14.889335701Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\"" Dec 13 14:37:14.889786 env[1267]: time="2024-12-13T14:37:14.889768261Z" level=info msg="StartContainer for \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\"" Dec 13 14:37:14.905801 systemd[1]: Started cri-containerd-cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec.scope. Dec 13 14:37:14.923000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.923000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f23ac6a3038 items=0 ppid=2585 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.923000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653938613237623161663433373862306362333830333631316339 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit: BPF prog-id=133 op=LOAD Dec 13 14:37:14.924000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003ae2f8 items=0 ppid=2585 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653938613237623161663433373862306362333830333631316339 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.924000 audit: BPF prog-id=134 op=LOAD Dec 13 14:37:14.924000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003ae348 items=0 ppid=2585 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653938613237623161663433373862306362333830333631316339 Dec 13 14:37:14.924000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:37:14.925000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { perfmon } for pid=2826 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit[2826]: AVC avc: denied { bpf } for pid=2826 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:14.925000 audit: BPF prog-id=135 op=LOAD Dec 13 14:37:14.925000 audit[2826]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003ae3d8 items=0 ppid=2585 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:14.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365653938613237623161663433373862306362333830333631316339 Dec 13 14:37:14.935424 env[1267]: time="2024-12-13T14:37:14.935397790Z" level=info msg="StartContainer for \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\" returns successfully" Dec 13 14:37:14.943733 kubelet[2106]: E1213 14:37:14.943706 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:16.710646 env[1267]: time="2024-12-13T14:37:16.710602655Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:37:16.712210 systemd[1]: cri-containerd-cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec.scope: Deactivated successfully. Dec 13 14:37:16.714000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:37:16.718759 kernel: kauditd_printk_skb: 77 callbacks suppressed Dec 13 14:37:16.718806 kernel: audit: type=1334 audit(1734100636.714:1003): prog-id=135 op=UNLOAD Dec 13 14:37:16.729428 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec-rootfs.mount: Deactivated successfully. Dec 13 14:37:16.741950 env[1267]: time="2024-12-13T14:37:16.741921979Z" level=info msg="shim disconnected" id=cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec Dec 13 14:37:16.742065 env[1267]: time="2024-12-13T14:37:16.742053813Z" level=warning msg="cleaning up after shim disconnected" id=cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec namespace=k8s.io Dec 13 14:37:16.742112 env[1267]: time="2024-12-13T14:37:16.742102132Z" level=info msg="cleaning up dead shim" Dec 13 14:37:16.750930 env[1267]: time="2024-12-13T14:37:16.750905228Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2866 runtime=io.containerd.runc.v2\n" Dec 13 14:37:16.800375 kubelet[2106]: I1213 14:37:16.800354 2106 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:37:16.851446 systemd[1]: Created slice kubepods-burstable-pod61699123_ed1d_4a68_b972_8f873921908d.slice. Dec 13 14:37:16.863412 systemd[1]: Created slice kubepods-burstable-podfa1676bd_7424_4d30_adcd_2b0d84fbc6c6.slice. Dec 13 14:37:16.866594 systemd[1]: Created slice kubepods-besteffort-pod1c486ab2_af5a_49b0_bbba_d82678b97543.slice. Dec 13 14:37:16.870116 systemd[1]: Created slice kubepods-besteffort-podc6d1116b_f94f_4e6c_a472_6990e3046598.slice. Dec 13 14:37:16.873209 systemd[1]: Created slice kubepods-besteffort-pod9707d41e_752b_4a91_9ca8_26fd0005b824.slice. Dec 13 14:37:16.946283 systemd[1]: Created slice kubepods-besteffort-pod137b900f_a1c0_406e_87c9_33eedf71f128.slice. Dec 13 14:37:16.948166 env[1267]: time="2024-12-13T14:37:16.948139897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rskds,Uid:137b900f-a1c0-406e-87c9-33eedf71f128,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:16.989105 kubelet[2106]: I1213 14:37:16.988895 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ncbgb\" (UniqueName: \"kubernetes.io/projected/fa1676bd-7424-4d30-adcd-2b0d84fbc6c6-kube-api-access-ncbgb\") pod \"coredns-6f6b679f8f-vlrm8\" (UID: \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\") " pod="kube-system/coredns-6f6b679f8f-vlrm8" Dec 13 14:37:16.989105 kubelet[2106]: I1213 14:37:16.988918 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k6rgv\" (UniqueName: \"kubernetes.io/projected/9707d41e-752b-4a91-9ca8-26fd0005b824-kube-api-access-k6rgv\") pod \"calico-apiserver-85f8cf69df-pjb27\" (UID: \"9707d41e-752b-4a91-9ca8-26fd0005b824\") " pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" Dec 13 14:37:16.989105 kubelet[2106]: I1213 14:37:16.988935 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1c486ab2-af5a-49b0-bbba-d82678b97543-calico-apiserver-certs\") pod \"calico-apiserver-85f8cf69df-6ztsn\" (UID: \"1c486ab2-af5a-49b0-bbba-d82678b97543\") " pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" Dec 13 14:37:16.989105 kubelet[2106]: I1213 14:37:16.988946 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lrp5\" (UniqueName: \"kubernetes.io/projected/c6d1116b-f94f-4e6c-a472-6990e3046598-kube-api-access-8lrp5\") pod \"calico-kube-controllers-5b8b7d84bb-qdzc8\" (UID: \"c6d1116b-f94f-4e6c-a472-6990e3046598\") " pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" Dec 13 14:37:16.989105 kubelet[2106]: I1213 14:37:16.988956 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n2cmp\" (UniqueName: \"kubernetes.io/projected/1c486ab2-af5a-49b0-bbba-d82678b97543-kube-api-access-n2cmp\") pod \"calico-apiserver-85f8cf69df-6ztsn\" (UID: \"1c486ab2-af5a-49b0-bbba-d82678b97543\") " pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" Dec 13 14:37:16.989495 kubelet[2106]: I1213 14:37:16.988967 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/61699123-ed1d-4a68-b972-8f873921908d-config-volume\") pod \"coredns-6f6b679f8f-v5ctd\" (UID: \"61699123-ed1d-4a68-b972-8f873921908d\") " pod="kube-system/coredns-6f6b679f8f-v5ctd" Dec 13 14:37:16.989495 kubelet[2106]: I1213 14:37:16.988976 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/9707d41e-752b-4a91-9ca8-26fd0005b824-calico-apiserver-certs\") pod \"calico-apiserver-85f8cf69df-pjb27\" (UID: \"9707d41e-752b-4a91-9ca8-26fd0005b824\") " pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" Dec 13 14:37:16.989495 kubelet[2106]: I1213 14:37:16.988988 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wpr9p\" (UniqueName: \"kubernetes.io/projected/61699123-ed1d-4a68-b972-8f873921908d-kube-api-access-wpr9p\") pod \"coredns-6f6b679f8f-v5ctd\" (UID: \"61699123-ed1d-4a68-b972-8f873921908d\") " pod="kube-system/coredns-6f6b679f8f-v5ctd" Dec 13 14:37:16.989495 kubelet[2106]: I1213 14:37:16.988998 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c6d1116b-f94f-4e6c-a472-6990e3046598-tigera-ca-bundle\") pod \"calico-kube-controllers-5b8b7d84bb-qdzc8\" (UID: \"c6d1116b-f94f-4e6c-a472-6990e3046598\") " pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" Dec 13 14:37:16.989495 kubelet[2106]: I1213 14:37:16.989007 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/fa1676bd-7424-4d30-adcd-2b0d84fbc6c6-config-volume\") pod \"coredns-6f6b679f8f-vlrm8\" (UID: \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\") " pod="kube-system/coredns-6f6b679f8f-vlrm8" Dec 13 14:37:17.010850 env[1267]: time="2024-12-13T14:37:17.010827171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:37:17.161316 env[1267]: time="2024-12-13T14:37:17.161285032Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-v5ctd,Uid:61699123-ed1d-4a68-b972-8f873921908d,Namespace:kube-system,Attempt:0,}" Dec 13 14:37:17.166720 env[1267]: time="2024-12-13T14:37:17.166680393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vlrm8,Uid:fa1676bd-7424-4d30-adcd-2b0d84fbc6c6,Namespace:kube-system,Attempt:0,}" Dec 13 14:37:17.168725 env[1267]: time="2024-12-13T14:37:17.168695732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-6ztsn,Uid:1c486ab2-af5a-49b0-bbba-d82678b97543,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:37:17.178090 env[1267]: time="2024-12-13T14:37:17.178066332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-pjb27,Uid:9707d41e-752b-4a91-9ca8-26fd0005b824,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:37:17.178409 env[1267]: time="2024-12-13T14:37:17.178254036Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b8b7d84bb-qdzc8,Uid:c6d1116b-f94f-4e6c-a472-6990e3046598,Namespace:calico-system,Attempt:0,}" Dec 13 14:37:17.501341 env[1267]: time="2024-12-13T14:37:17.501282077Z" level=error msg="Failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.501601 env[1267]: time="2024-12-13T14:37:17.501575407Z" level=error msg="encountered an error cleaning up failed sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.501844 env[1267]: time="2024-12-13T14:37:17.501619818Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b8b7d84bb-qdzc8,Uid:c6d1116b-f94f-4e6c-a472-6990e3046598,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.502052 kubelet[2106]: E1213 14:37:17.502012 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.502100 kubelet[2106]: E1213 14:37:17.502078 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" Dec 13 14:37:17.502100 kubelet[2106]: E1213 14:37:17.502094 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" Dec 13 14:37:17.502168 kubelet[2106]: E1213 14:37:17.502130 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5b8b7d84bb-qdzc8_calico-system(c6d1116b-f94f-4e6c-a472-6990e3046598)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5b8b7d84bb-qdzc8_calico-system(c6d1116b-f94f-4e6c-a472-6990e3046598)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:37:17.503213 env[1267]: time="2024-12-13T14:37:17.502834675Z" level=error msg="Failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.503213 env[1267]: time="2024-12-13T14:37:17.503057969Z" level=error msg="encountered an error cleaning up failed sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.503213 env[1267]: time="2024-12-13T14:37:17.503095020Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-v5ctd,Uid:61699123-ed1d-4a68-b972-8f873921908d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.503515 kubelet[2106]: E1213 14:37:17.503370 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.503515 kubelet[2106]: E1213 14:37:17.503400 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-v5ctd" Dec 13 14:37:17.503515 kubelet[2106]: E1213 14:37:17.503413 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-v5ctd" Dec 13 14:37:17.503605 kubelet[2106]: E1213 14:37:17.503482 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-v5ctd_kube-system(61699123-ed1d-4a68-b972-8f873921908d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-v5ctd_kube-system(61699123-ed1d-4a68-b972-8f873921908d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:37:17.505485 env[1267]: time="2024-12-13T14:37:17.504509146Z" level=error msg="Failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.505946 env[1267]: time="2024-12-13T14:37:17.505737042Z" level=error msg="encountered an error cleaning up failed sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.505946 env[1267]: time="2024-12-13T14:37:17.505828869Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rskds,Uid:137b900f-a1c0-406e-87c9-33eedf71f128,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.507210 kubelet[2106]: E1213 14:37:17.506385 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.507210 kubelet[2106]: E1213 14:37:17.506416 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:17.507210 kubelet[2106]: E1213 14:37:17.506429 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rskds" Dec 13 14:37:17.507324 kubelet[2106]: E1213 14:37:17.507186 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rskds_calico-system(137b900f-a1c0-406e-87c9-33eedf71f128)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rskds_calico-system(137b900f-a1c0-406e-87c9-33eedf71f128)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:17.510904 env[1267]: time="2024-12-13T14:37:17.510875512Z" level=error msg="Failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.511260 env[1267]: time="2024-12-13T14:37:17.511241669Z" level=error msg="encountered an error cleaning up failed sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.511343 env[1267]: time="2024-12-13T14:37:17.511326590Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-pjb27,Uid:9707d41e-752b-4a91-9ca8-26fd0005b824,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.512591 kubelet[2106]: E1213 14:37:17.511517 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.512591 kubelet[2106]: E1213 14:37:17.511558 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" Dec 13 14:37:17.512591 kubelet[2106]: E1213 14:37:17.511575 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" Dec 13 14:37:17.512735 kubelet[2106]: E1213 14:37:17.511604 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-85f8cf69df-pjb27_calico-apiserver(9707d41e-752b-4a91-9ca8-26fd0005b824)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-85f8cf69df-pjb27_calico-apiserver(9707d41e-752b-4a91-9ca8-26fd0005b824)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podUID="9707d41e-752b-4a91-9ca8-26fd0005b824" Dec 13 14:37:17.512843 env[1267]: time="2024-12-13T14:37:17.512816537Z" level=error msg="Failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.513047 env[1267]: time="2024-12-13T14:37:17.513026136Z" level=error msg="encountered an error cleaning up failed sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.513094 env[1267]: time="2024-12-13T14:37:17.513066142Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-6ztsn,Uid:1c486ab2-af5a-49b0-bbba-d82678b97543,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.513405 kubelet[2106]: E1213 14:37:17.513143 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.513405 kubelet[2106]: E1213 14:37:17.513168 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" Dec 13 14:37:17.513405 kubelet[2106]: E1213 14:37:17.513179 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" Dec 13 14:37:17.514194 kubelet[2106]: E1213 14:37:17.513214 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-85f8cf69df-6ztsn_calico-apiserver(1c486ab2-af5a-49b0-bbba-d82678b97543)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-85f8cf69df-6ztsn_calico-apiserver(1c486ab2-af5a-49b0-bbba-d82678b97543)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podUID="1c486ab2-af5a-49b0-bbba-d82678b97543" Dec 13 14:37:17.516417 env[1267]: time="2024-12-13T14:37:17.516383243Z" level=error msg="Failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.516628 env[1267]: time="2024-12-13T14:37:17.516607585Z" level=error msg="encountered an error cleaning up failed sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.516659 env[1267]: time="2024-12-13T14:37:17.516638841Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vlrm8,Uid:fa1676bd-7424-4d30-adcd-2b0d84fbc6c6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.516755 kubelet[2106]: E1213 14:37:17.516731 2106 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:17.516811 kubelet[2106]: E1213 14:37:17.516796 2106 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vlrm8" Dec 13 14:37:17.516841 kubelet[2106]: E1213 14:37:17.516815 2106 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-vlrm8" Dec 13 14:37:17.516881 kubelet[2106]: E1213 14:37:17.516863 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-vlrm8_kube-system(fa1676bd-7424-4d30-adcd-2b0d84fbc6c6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-vlrm8_kube-system(fa1676bd-7424-4d30-adcd-2b0d84fbc6c6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vlrm8" podUID="fa1676bd-7424-4d30-adcd-2b0d84fbc6c6" Dec 13 14:37:17.733299 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b-shm.mount: Deactivated successfully. Dec 13 14:37:18.006208 kubelet[2106]: I1213 14:37:18.005963 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:37:18.009346 kubelet[2106]: I1213 14:37:18.009140 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:37:18.015952 kubelet[2106]: I1213 14:37:18.015937 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:37:18.019500 kubelet[2106]: I1213 14:37:18.019485 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:37:18.021849 env[1267]: time="2024-12-13T14:37:18.021815090Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:37:18.022091 env[1267]: time="2024-12-13T14:37:18.022063438Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:37:18.022346 env[1267]: time="2024-12-13T14:37:18.022328675Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:37:18.022607 env[1267]: time="2024-12-13T14:37:18.022594420Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:37:18.023340 kubelet[2106]: I1213 14:37:18.023327 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:37:18.024610 env[1267]: time="2024-12-13T14:37:18.024592574Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:37:18.026067 kubelet[2106]: I1213 14:37:18.026052 2106 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:37:18.027333 env[1267]: time="2024-12-13T14:37:18.027265530Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:37:18.045947 env[1267]: time="2024-12-13T14:37:18.045903070Z" level=error msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" failed" error="failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.046304 kubelet[2106]: E1213 14:37:18.046167 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:37:18.046304 kubelet[2106]: E1213 14:37:18.046209 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6"} Dec 13 14:37:18.046304 kubelet[2106]: E1213 14:37:18.046263 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.046304 kubelet[2106]: E1213 14:37:18.046277 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:37:18.080719 env[1267]: time="2024-12-13T14:37:18.080687612Z" level=error msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" failed" error="failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.081065 kubelet[2106]: E1213 14:37:18.080957 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:37:18.081065 kubelet[2106]: E1213 14:37:18.080997 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807"} Dec 13 14:37:18.081065 kubelet[2106]: E1213 14:37:18.081020 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.081065 kubelet[2106]: E1213 14:37:18.081033 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podUID="9707d41e-752b-4a91-9ca8-26fd0005b824" Dec 13 14:37:18.093961 env[1267]: time="2024-12-13T14:37:18.093922849Z" level=error msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" failed" error="failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.094323 kubelet[2106]: E1213 14:37:18.094210 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:37:18.094323 kubelet[2106]: E1213 14:37:18.094243 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9"} Dec 13 14:37:18.094323 kubelet[2106]: E1213 14:37:18.094267 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.094323 kubelet[2106]: E1213 14:37:18.094294 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podUID="1c486ab2-af5a-49b0-bbba-d82678b97543" Dec 13 14:37:18.094598 env[1267]: time="2024-12-13T14:37:18.094579911Z" level=error msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" failed" error="failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.094877 kubelet[2106]: E1213 14:37:18.094757 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:37:18.094877 kubelet[2106]: E1213 14:37:18.094774 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602"} Dec 13 14:37:18.094877 kubelet[2106]: E1213 14:37:18.094788 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.094877 kubelet[2106]: E1213 14:37:18.094806 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vlrm8" podUID="fa1676bd-7424-4d30-adcd-2b0d84fbc6c6" Dec 13 14:37:18.095605 env[1267]: time="2024-12-13T14:37:18.095571729Z" level=error msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" failed" error="failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.095804 kubelet[2106]: E1213 14:37:18.095707 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:37:18.095804 kubelet[2106]: E1213 14:37:18.095729 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead"} Dec 13 14:37:18.095804 kubelet[2106]: E1213 14:37:18.095773 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.095804 kubelet[2106]: E1213 14:37:18.095790 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:37:18.096072 env[1267]: time="2024-12-13T14:37:18.096054199Z" level=error msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" failed" error="failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:18.096248 kubelet[2106]: E1213 14:37:18.096178 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:37:18.096248 kubelet[2106]: E1213 14:37:18.096195 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b"} Dec 13 14:37:18.096248 kubelet[2106]: E1213 14:37:18.096208 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:18.096248 kubelet[2106]: E1213 14:37:18.096229 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:22.281497 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount111386844.mount: Deactivated successfully. Dec 13 14:37:22.509124 env[1267]: time="2024-12-13T14:37:22.509091443Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:22.536203 env[1267]: time="2024-12-13T14:37:22.536137432Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:22.543924 env[1267]: time="2024-12-13T14:37:22.543905141Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:22.555037 env[1267]: time="2024-12-13T14:37:22.555017115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:37:22.555384 env[1267]: time="2024-12-13T14:37:22.555362717Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 14:37:22.615357 env[1267]: time="2024-12-13T14:37:22.615331950Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:37:22.636915 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1279592235.mount: Deactivated successfully. Dec 13 14:37:22.639201 env[1267]: time="2024-12-13T14:37:22.639178334Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a\"" Dec 13 14:37:22.640370 env[1267]: time="2024-12-13T14:37:22.640357314Z" level=info msg="StartContainer for \"8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a\"" Dec 13 14:37:22.665086 systemd[1]: Started cri-containerd-8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a.scope. Dec 13 14:37:22.677000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.696236 kernel: audit: type=1400 audit(1734100642.677:1004): avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.696284 kernel: audit: type=1300 audit(1734100642.677:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9678541cc8 items=0 ppid=2585 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.696301 kernel: audit: type=1327 audit(1734100642.677:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323432326532623536393230303637323632333238336264383463 Dec 13 14:37:22.696321 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.696336 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.677000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f9678541cc8 items=0 ppid=2585 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.710173 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.710221 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.710239 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.710258 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323432326532623536393230303637323632333238336264383463 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.714793 kernel: audit: type=1400 audit(1734100642.678:1005): avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.715062 env[1267]: time="2024-12-13T14:37:22.715035772Z" level=info msg="StartContainer for \"8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a\" returns successfully" Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit: BPF prog-id=136 op=LOAD Dec 13 14:37:22.678000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027bf68 items=0 ppid=2585 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323432326532623536393230303637323632333238336264383463 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.678000 audit: BPF prog-id=137 op=LOAD Dec 13 14:37:22.678000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027bfb8 items=0 ppid=2585 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323432326532623536393230303637323632333238336264383463 Dec 13 14:37:22.680000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:37:22.680000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { perfmon } for pid=3208 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit[3208]: AVC avc: denied { bpf } for pid=3208 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:22.680000 audit: BPF prog-id=138 op=LOAD Dec 13 14:37:22.680000 audit[3208]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00034c048 items=0 ppid=2585 pid=3208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:22.680000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861323432326532623536393230303637323632333238336264383463 Dec 13 14:37:23.120693 kubelet[2106]: I1213 14:37:23.118331 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-s82f5" podStartSLOduration=1.51422425 podStartE2EDuration="18.094343589s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:37:05.987643098 +0000 UTC m=+11.232170203" lastFinishedPulling="2024-12-13 14:37:22.567762435 +0000 UTC m=+27.812289542" observedRunningTime="2024-12-13 14:37:23.090228133 +0000 UTC m=+28.334755234" watchObservedRunningTime="2024-12-13 14:37:23.094343589 +0000 UTC m=+28.338870686" Dec 13 14:37:23.178831 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:37:23.178918 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:37:23.229483 systemd[1]: cri-containerd-8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a.scope: Deactivated successfully. Dec 13 14:37:23.231000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:37:23.244690 env[1267]: time="2024-12-13T14:37:23.244647569Z" level=info msg="shim disconnected" id=8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a Dec 13 14:37:23.244690 env[1267]: time="2024-12-13T14:37:23.244683489Z" level=warning msg="cleaning up after shim disconnected" id=8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a namespace=k8s.io Dec 13 14:37:23.244690 env[1267]: time="2024-12-13T14:37:23.244690363Z" level=info msg="cleaning up dead shim" Dec 13 14:37:23.249463 env[1267]: time="2024-12-13T14:37:23.249445733Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3259 runtime=io.containerd.runc.v2\n" Dec 13 14:37:24.051780 kubelet[2106]: I1213 14:37:24.048058 2106 scope.go:117] "RemoveContainer" containerID="8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a" Dec 13 14:37:24.054649 env[1267]: time="2024-12-13T14:37:24.054601062Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" Dec 13 14:37:24.064356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount327051719.mount: Deactivated successfully. Dec 13 14:37:24.069304 env[1267]: time="2024-12-13T14:37:24.069267656Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86\"" Dec 13 14:37:24.075809 env[1267]: time="2024-12-13T14:37:24.075778613Z" level=info msg="StartContainer for \"ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86\"" Dec 13 14:37:24.095166 systemd[1]: Started cri-containerd-ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86.scope. Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb07e63aa18 items=0 ppid=2585 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623339353963656565366530633939376432326436616139303466 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.107000 audit: BPF prog-id=139 op=LOAD Dec 13 14:37:24.107000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000dfba8 items=0 ppid=2585 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.107000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623339353963656565366530633939376432326436616139303466 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit: BPF prog-id=140 op=LOAD Dec 13 14:37:24.108000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000dfbf8 items=0 ppid=2585 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623339353963656565366530633939376432326436616139303466 Dec 13 14:37:24.108000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:37:24.108000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { perfmon } for pid=3279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit[3279]: AVC avc: denied { bpf } for pid=3279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:24.108000 audit: BPF prog-id=141 op=LOAD Dec 13 14:37:24.108000 audit[3279]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000dfc88 items=0 ppid=2585 pid=3279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:24.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562623339353963656565366530633939376432326436616139303466 Dec 13 14:37:24.123439 env[1267]: time="2024-12-13T14:37:24.123343393Z" level=info msg="StartContainer for \"ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86\" returns successfully" Dec 13 14:37:24.205164 systemd[1]: cri-containerd-ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86.scope: Deactivated successfully. Dec 13 14:37:24.207000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:37:24.230646 env[1267]: time="2024-12-13T14:37:24.230617517Z" level=info msg="shim disconnected" id=ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86 Dec 13 14:37:24.230813 env[1267]: time="2024-12-13T14:37:24.230801471Z" level=warning msg="cleaning up after shim disconnected" id=ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86 namespace=k8s.io Dec 13 14:37:24.230868 env[1267]: time="2024-12-13T14:37:24.230859232Z" level=info msg="cleaning up dead shim" Dec 13 14:37:24.236177 env[1267]: time="2024-12-13T14:37:24.236150664Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3325 runtime=io.containerd.runc.v2\n" Dec 13 14:37:24.282641 systemd[1]: run-containerd-runc-k8s.io-ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86-runc.2JiGn4.mount: Deactivated successfully. Dec 13 14:37:24.282726 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86-rootfs.mount: Deactivated successfully. Dec 13 14:37:25.047827 kubelet[2106]: I1213 14:37:25.047804 2106 scope.go:117] "RemoveContainer" containerID="8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a" Dec 13 14:37:25.048196 kubelet[2106]: I1213 14:37:25.048181 2106 scope.go:117] "RemoveContainer" containerID="ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86" Dec 13 14:37:25.049980 env[1267]: time="2024-12-13T14:37:25.049948545Z" level=info msg="RemoveContainer for \"8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a\"" Dec 13 14:37:25.063435 kubelet[2106]: E1213 14:37:25.063395 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-s82f5_calico-system(cf827bae-b749-4ffc-a34b-13b53b67ecfa)\"" pod="calico-system/calico-node-s82f5" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" Dec 13 14:37:25.064635 env[1267]: time="2024-12-13T14:37:25.064611688Z" level=info msg="RemoveContainer for \"8a2422e2b569200672623283bd84c80df4273763167352b12428f94b6de94d1a\" returns successfully" Dec 13 14:37:26.371173 kubelet[2106]: I1213 14:37:26.371148 2106 scope.go:117] "RemoveContainer" containerID="ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86" Dec 13 14:37:26.371637 kubelet[2106]: E1213 14:37:26.371620 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-s82f5_calico-system(cf827bae-b749-4ffc-a34b-13b53b67ecfa)\"" pod="calico-system/calico-node-s82f5" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" Dec 13 14:37:27.407410 kubelet[2106]: I1213 14:37:27.407383 2106 scope.go:117] "RemoveContainer" containerID="ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86" Dec 13 14:37:27.407812 kubelet[2106]: E1213 14:37:27.407501 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-s82f5_calico-system(cf827bae-b749-4ffc-a34b-13b53b67ecfa)\"" pod="calico-system/calico-node-s82f5" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" Dec 13 14:37:28.942986 env[1267]: time="2024-12-13T14:37:28.942950119Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:37:28.984459 env[1267]: time="2024-12-13T14:37:28.984421837Z" level=error msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" failed" error="failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:28.999841 kubelet[2106]: E1213 14:37:28.999691 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:37:28.999841 kubelet[2106]: E1213 14:37:28.999758 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead"} Dec 13 14:37:28.999841 kubelet[2106]: E1213 14:37:28.999795 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:28.999841 kubelet[2106]: E1213 14:37:28.999815 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:37:29.943004 env[1267]: time="2024-12-13T14:37:29.942976334Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:37:29.943351 env[1267]: time="2024-12-13T14:37:29.943332225Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:37:29.966178 env[1267]: time="2024-12-13T14:37:29.966143562Z" level=error msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" failed" error="failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:29.966507 kubelet[2106]: E1213 14:37:29.966398 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:37:29.966507 kubelet[2106]: E1213 14:37:29.966445 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b"} Dec 13 14:37:29.966507 kubelet[2106]: E1213 14:37:29.966468 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:29.966507 kubelet[2106]: E1213 14:37:29.966482 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:29.972571 env[1267]: time="2024-12-13T14:37:29.972538046Z" level=error msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" failed" error="failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:29.972810 kubelet[2106]: E1213 14:37:29.972780 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:37:29.972854 kubelet[2106]: E1213 14:37:29.972822 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6"} Dec 13 14:37:29.972854 kubelet[2106]: E1213 14:37:29.972845 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:29.972925 kubelet[2106]: E1213 14:37:29.972860 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:37:30.434876 kubelet[2106]: I1213 14:37:30.434845 2106 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:37:30.663784 kernel: kauditd_printk_skb: 78 callbacks suppressed Dec 13 14:37:30.663867 kernel: audit: type=1325 audit(1734100650.660:1018): table=filter:95 family=2 entries=17 op=nft_register_rule pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:30.666773 kernel: audit: type=1300 audit(1734100650.660:1018): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffd07079c0 a2=0 a3=7fffd07079ac items=0 ppid=2262 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.660000 audit[3402]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:30.660000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffd07079c0 a2=0 a3=7fffd07079ac items=0 ppid=2262 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:30.671423 kernel: audit: type=1327 audit(1734100650.660:1018): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:30.671470 kernel: audit: type=1325 audit(1734100650.668:1019): table=nat:96 family=2 entries=19 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:30.668000 audit[3402]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:37:30.668000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffd07079c0 a2=0 a3=7fffd07079ac items=0 ppid=2262 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.677728 kernel: audit: type=1300 audit(1734100650.668:1019): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fffd07079c0 a2=0 a3=7fffd07079ac items=0 ppid=2262 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:30.677839 kernel: audit: type=1327 audit(1734100650.668:1019): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:30.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:37:30.943543 env[1267]: time="2024-12-13T14:37:30.943516024Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:37:30.947601 env[1267]: time="2024-12-13T14:37:30.943516041Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:37:30.963787 env[1267]: time="2024-12-13T14:37:30.963721713Z" level=error msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" failed" error="failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:30.963946 kubelet[2106]: E1213 14:37:30.963910 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:37:30.963991 kubelet[2106]: E1213 14:37:30.963957 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602"} Dec 13 14:37:30.963991 kubelet[2106]: E1213 14:37:30.963985 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:30.969969 kubelet[2106]: E1213 14:37:30.964008 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vlrm8" podUID="fa1676bd-7424-4d30-adcd-2b0d84fbc6c6" Dec 13 14:37:30.969969 kubelet[2106]: E1213 14:37:30.964613 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:37:30.969969 kubelet[2106]: E1213 14:37:30.964630 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9"} Dec 13 14:37:30.969969 kubelet[2106]: E1213 14:37:30.964644 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:30.970110 env[1267]: time="2024-12-13T14:37:30.964534267Z" level=error msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" failed" error="failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:30.970140 kubelet[2106]: E1213 14:37:30.964667 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podUID="1c486ab2-af5a-49b0-bbba-d82678b97543" Dec 13 14:37:32.943288 env[1267]: time="2024-12-13T14:37:32.943256853Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:37:32.958881 env[1267]: time="2024-12-13T14:37:32.958841936Z" level=error msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" failed" error="failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:32.959142 kubelet[2106]: E1213 14:37:32.959044 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:37:32.959142 kubelet[2106]: E1213 14:37:32.959076 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807"} Dec 13 14:37:32.959142 kubelet[2106]: E1213 14:37:32.959097 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:32.959142 kubelet[2106]: E1213 14:37:32.959115 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podUID="9707d41e-752b-4a91-9ca8-26fd0005b824" Dec 13 14:37:41.942940 kubelet[2106]: I1213 14:37:41.942908 2106 scope.go:117] "RemoveContainer" containerID="ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86" Dec 13 14:37:41.943994 env[1267]: time="2024-12-13T14:37:41.943553054Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:37:41.946910 env[1267]: time="2024-12-13T14:37:41.946653131Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" Dec 13 14:37:41.983960 env[1267]: time="2024-12-13T14:37:41.983921054Z" level=error msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" failed" error="failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:41.984078 kubelet[2106]: E1213 14:37:41.984052 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:37:41.984116 kubelet[2106]: E1213 14:37:41.984096 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead"} Dec 13 14:37:41.984138 kubelet[2106]: E1213 14:37:41.984120 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:41.984185 kubelet[2106]: E1213 14:37:41.984136 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:37:41.992721 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1502709366.mount: Deactivated successfully. Dec 13 14:37:42.019460 env[1267]: time="2024-12-13T14:37:42.019433529Z" level=info msg="CreateContainer within sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\"" Dec 13 14:37:42.020592 env[1267]: time="2024-12-13T14:37:42.020575912Z" level=info msg="StartContainer for \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\"" Dec 13 14:37:42.037945 systemd[1]: Started cri-containerd-b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672.scope. Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.068093 kernel: audit: type=1400 audit(1734100662.058:1020): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.068130 kernel: audit: type=1300 audit(1734100662.058:1020): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f95bc733488 items=0 ppid=2585 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.068147 kernel: audit: type=1327 audit(1734100662.058:1020): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237643234323133303161353033353634626164636432646537666637 Dec 13 14:37:42.058000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f95bc733488 items=0 ppid=2585 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237643234323133303161353033353634626164636432646537666637 Dec 13 14:37:42.071406 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076116 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076320 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.086352 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.086400 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.090394 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.095070 kernel: audit: type=1400 audit(1734100662.058:1021): avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.058000 audit: BPF prog-id=142 op=LOAD Dec 13 14:37:42.058000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00025bc08 items=0 ppid=2585 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.058000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237643234323133303161353033353634626164636432646537666637 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.071000 audit: BPF prog-id=143 op=LOAD Dec 13 14:37:42.071000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00025bc58 items=0 ppid=2585 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.071000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237643234323133303161353033353634626164636432646537666637 Dec 13 14:37:42.076000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:37:42.076000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { perfmon } for pid=3489 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit[3489]: AVC avc: denied { bpf } for pid=3489 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:37:42.076000 audit: BPF prog-id=144 op=LOAD Dec 13 14:37:42.076000 audit[3489]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00025bce8 items=0 ppid=2585 pid=3489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:37:42.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237643234323133303161353033353634626164636432646537666637 Dec 13 14:37:42.118070 env[1267]: time="2024-12-13T14:37:42.118034205Z" level=info msg="StartContainer for \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\" returns successfully" Dec 13 14:37:42.501852 systemd[1]: cri-containerd-b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672.scope: Deactivated successfully. Dec 13 14:37:42.504000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:37:42.515770 env[1267]: time="2024-12-13T14:37:42.515724477Z" level=info msg="shim disconnected" id=b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672 Dec 13 14:37:42.515877 env[1267]: time="2024-12-13T14:37:42.515769655Z" level=warning msg="cleaning up after shim disconnected" id=b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672 namespace=k8s.io Dec 13 14:37:42.515877 env[1267]: time="2024-12-13T14:37:42.515778507Z" level=info msg="cleaning up dead shim" Dec 13 14:37:42.520195 env[1267]: time="2024-12-13T14:37:42.520177491Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:37:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3535 runtime=io.containerd.runc.v2\n" Dec 13 14:37:42.943859 env[1267]: time="2024-12-13T14:37:42.943764210Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:37:42.963338 env[1267]: time="2024-12-13T14:37:42.963289766Z" level=error msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" failed" error="failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:42.963629 kubelet[2106]: E1213 14:37:42.963428 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:37:42.963629 kubelet[2106]: E1213 14:37:42.963471 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b"} Dec 13 14:37:42.963629 kubelet[2106]: E1213 14:37:42.963493 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:42.963629 kubelet[2106]: E1213 14:37:42.963506 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:42.990578 systemd[1]: run-containerd-runc-k8s.io-b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672-runc.iMoNfC.mount: Deactivated successfully. Dec 13 14:37:42.990650 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672-rootfs.mount: Deactivated successfully. Dec 13 14:37:43.084763 kubelet[2106]: I1213 14:37:43.084065 2106 scope.go:117] "RemoveContainer" containerID="ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86" Dec 13 14:37:43.084763 kubelet[2106]: I1213 14:37:43.084324 2106 scope.go:117] "RemoveContainer" containerID="b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672" Dec 13 14:37:43.084763 kubelet[2106]: E1213 14:37:43.084424 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-s82f5_calico-system(cf827bae-b749-4ffc-a34b-13b53b67ecfa)\"" pod="calico-system/calico-node-s82f5" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" Dec 13 14:37:43.085599 env[1267]: time="2024-12-13T14:37:43.085577265Z" level=info msg="RemoveContainer for \"ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86\"" Dec 13 14:37:43.088223 env[1267]: time="2024-12-13T14:37:43.088205596Z" level=info msg="RemoveContainer for \"ebb3959ceee6e0c997d22d6aa904f1fbb843c83754194d448a43427c7a49ae86\" returns successfully" Dec 13 14:37:43.942947 env[1267]: time="2024-12-13T14:37:43.942912138Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:37:43.943168 env[1267]: time="2024-12-13T14:37:43.942971752Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:37:43.961418 env[1267]: time="2024-12-13T14:37:43.961374270Z" level=error msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" failed" error="failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:43.961915 kubelet[2106]: E1213 14:37:43.961762 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:37:43.961915 kubelet[2106]: E1213 14:37:43.961795 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6"} Dec 13 14:37:43.961915 kubelet[2106]: E1213 14:37:43.961819 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:43.961915 kubelet[2106]: E1213 14:37:43.961833 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:37:43.965755 env[1267]: time="2024-12-13T14:37:43.965716557Z" level=error msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" failed" error="failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:43.965929 kubelet[2106]: E1213 14:37:43.965826 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:37:43.965929 kubelet[2106]: E1213 14:37:43.965862 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9"} Dec 13 14:37:43.965929 kubelet[2106]: E1213 14:37:43.965879 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:43.965929 kubelet[2106]: E1213 14:37:43.965894 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podUID="1c486ab2-af5a-49b0-bbba-d82678b97543" Dec 13 14:37:44.942947 env[1267]: time="2024-12-13T14:37:44.942912838Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:37:44.959328 env[1267]: time="2024-12-13T14:37:44.959283611Z" level=error msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" failed" error="failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:44.959524 kubelet[2106]: E1213 14:37:44.959463 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:37:44.959524 kubelet[2106]: E1213 14:37:44.959510 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602"} Dec 13 14:37:44.959620 kubelet[2106]: E1213 14:37:44.959545 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:44.959620 kubelet[2106]: E1213 14:37:44.959561 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vlrm8" podUID="fa1676bd-7424-4d30-adcd-2b0d84fbc6c6" Dec 13 14:37:46.942402 env[1267]: time="2024-12-13T14:37:46.942377910Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:37:46.959617 env[1267]: time="2024-12-13T14:37:46.959582475Z" level=error msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" failed" error="failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:46.959903 kubelet[2106]: E1213 14:37:46.959842 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:37:46.960081 kubelet[2106]: E1213 14:37:46.959901 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807"} Dec 13 14:37:46.960081 kubelet[2106]: E1213 14:37:46.959925 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:46.960081 kubelet[2106]: E1213 14:37:46.959951 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podUID="9707d41e-752b-4a91-9ca8-26fd0005b824" Dec 13 14:37:50.683000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:50.685207 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:37:50.685266 kernel: audit: type=1400 audit(1734100670.683:1028): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:50.683000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:50.692401 kernel: audit: type=1400 audit(1734100670.683:1027): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:50.692439 kernel: audit: type=1300 audit(1734100670.683:1027): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c3c6f0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:50.683000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000c3c6f0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:50.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:50.699557 kernel: audit: type=1327 audit(1734100670.683:1027): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:50.699585 kernel: audit: type=1300 audit(1734100670.683:1028): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00214d360 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:50.683000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00214d360 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:50.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:50.706851 kernel: audit: type=1327 audit(1734100670.683:1028): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:51.486000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.486000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00412b280 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.494315 kernel: audit: type=1400 audit(1734100671.486:1029): avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.494360 kernel: audit: type=1300 audit(1734100671.486:1029): arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c00412b280 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.486000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.497679 kernel: audit: type=1327 audit(1734100671.486:1029): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.490000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.500761 kernel: audit: type=1400 audit(1734100671.490:1030): avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.490000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f11d2c0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.490000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.490000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f11d2f0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.490000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.490000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c0080ab8c0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.490000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.497000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.497000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00f11d320 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:51.497000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:51.497000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=64 a1=c00412b5c0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:37:51.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:37:53.497000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:53.497000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00214d600 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:53.497000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:53.501000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:53.501000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00214d620 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:53.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:53.501000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:53.501000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00214d640 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:53.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:53.501000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:37:53.501000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000a6f4a0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:37:53.501000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:37:54.986918 env[1267]: time="2024-12-13T14:37:54.986884956Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:37:55.011407 env[1267]: time="2024-12-13T14:37:55.011368376Z" level=error msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" failed" error="failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:55.011529 kubelet[2106]: E1213 14:37:55.011500 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:37:55.011719 kubelet[2106]: E1213 14:37:55.011540 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead"} Dec 13 14:37:55.011719 kubelet[2106]: E1213 14:37:55.011564 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:55.011719 kubelet[2106]: E1213 14:37:55.011578 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:37:55.942898 env[1267]: time="2024-12-13T14:37:55.942841601Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:37:55.943088 env[1267]: time="2024-12-13T14:37:55.942841880Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:37:55.971116 env[1267]: time="2024-12-13T14:37:55.971078932Z" level=error msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" failed" error="failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:55.971490 kubelet[2106]: E1213 14:37:55.971371 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:37:55.971490 kubelet[2106]: E1213 14:37:55.971418 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b"} Dec 13 14:37:55.971490 kubelet[2106]: E1213 14:37:55.971440 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:55.971490 kubelet[2106]: E1213 14:37:55.971462 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:37:55.971847 env[1267]: time="2024-12-13T14:37:55.971826721Z" level=error msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" failed" error="failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:55.972056 kubelet[2106]: E1213 14:37:55.971957 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:37:55.972056 kubelet[2106]: E1213 14:37:55.971980 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6"} Dec 13 14:37:55.972056 kubelet[2106]: E1213 14:37:55.972012 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:55.972056 kubelet[2106]: E1213 14:37:55.972029 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:37:56.371205 kubelet[2106]: I1213 14:37:56.371185 2106 scope.go:117] "RemoveContainer" containerID="b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672" Dec 13 14:37:56.371577 kubelet[2106]: E1213 14:37:56.371563 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-s82f5_calico-system(cf827bae-b749-4ffc-a34b-13b53b67ecfa)\"" pod="calico-system/calico-node-s82f5" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" Dec 13 14:37:56.943404 env[1267]: time="2024-12-13T14:37:56.943356389Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:37:56.961569 env[1267]: time="2024-12-13T14:37:56.961521373Z" level=error msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" failed" error="failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:56.961859 kubelet[2106]: E1213 14:37:56.961759 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:37:56.961859 kubelet[2106]: E1213 14:37:56.961796 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9"} Dec 13 14:37:56.961859 kubelet[2106]: E1213 14:37:56.961818 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:56.961859 kubelet[2106]: E1213 14:37:56.961835 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1c486ab2-af5a-49b0-bbba-d82678b97543\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podUID="1c486ab2-af5a-49b0-bbba-d82678b97543" Dec 13 14:37:59.943033 env[1267]: time="2024-12-13T14:37:59.942998911Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:37:59.943369 env[1267]: time="2024-12-13T14:37:59.943356268Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:37:59.962375 env[1267]: time="2024-12-13T14:37:59.962340647Z" level=error msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" failed" error="failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:59.962632 kubelet[2106]: E1213 14:37:59.962602 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:37:59.962819 kubelet[2106]: E1213 14:37:59.962646 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807"} Dec 13 14:37:59.962819 kubelet[2106]: E1213 14:37:59.962670 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:59.962819 kubelet[2106]: E1213 14:37:59.962685 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9707d41e-752b-4a91-9ca8-26fd0005b824\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podUID="9707d41e-752b-4a91-9ca8-26fd0005b824" Dec 13 14:37:59.963005 env[1267]: time="2024-12-13T14:37:59.962979177Z" level=error msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" failed" error="failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:37:59.963158 kubelet[2106]: E1213 14:37:59.963087 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:37:59.963158 kubelet[2106]: E1213 14:37:59.963106 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602"} Dec 13 14:37:59.963158 kubelet[2106]: E1213 14:37:59.963121 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:37:59.963158 kubelet[2106]: E1213 14:37:59.963144 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-vlrm8" podUID="fa1676bd-7424-4d30-adcd-2b0d84fbc6c6" Dec 13 14:38:06.614275 env[1267]: time="2024-12-13T14:38:06.614081143Z" level=info msg="StopPodSandbox for \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\"" Dec 13 14:38:06.614275 env[1267]: time="2024-12-13T14:38:06.614139867Z" level=info msg="Container to stop \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:38:06.614275 env[1267]: time="2024-12-13T14:38:06.614149772Z" level=info msg="Container to stop \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:38:06.614275 env[1267]: time="2024-12-13T14:38:06.614156540Z" level=info msg="Container to stop \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 14:38:06.616014 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408-shm.mount: Deactivated successfully. Dec 13 14:38:06.621381 systemd[1]: cri-containerd-687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408.scope: Deactivated successfully. Dec 13 14:38:06.620000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:38:06.623577 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 14:38:06.623636 kernel: audit: type=1334 audit(1734100686.620:1039): prog-id=122 op=UNLOAD Dec 13 14:38:06.625000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:38:06.627770 kernel: audit: type=1334 audit(1734100686.625:1040): prog-id=125 op=UNLOAD Dec 13 14:38:06.636099 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408-rootfs.mount: Deactivated successfully. Dec 13 14:38:06.641617 env[1267]: time="2024-12-13T14:38:06.641584408Z" level=info msg="shim disconnected" id=687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408 Dec 13 14:38:06.641617 env[1267]: time="2024-12-13T14:38:06.641615119Z" level=warning msg="cleaning up after shim disconnected" id=687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408 namespace=k8s.io Dec 13 14:38:06.641617 env[1267]: time="2024-12-13T14:38:06.641622381Z" level=info msg="cleaning up dead shim" Dec 13 14:38:06.646661 env[1267]: time="2024-12-13T14:38:06.646627066Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:38:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3788 runtime=io.containerd.runc.v2\n" Dec 13 14:38:06.647074 env[1267]: time="2024-12-13T14:38:06.647056870Z" level=info msg="TearDown network for sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" successfully" Dec 13 14:38:06.647074 env[1267]: time="2024-12-13T14:38:06.647073282Z" level=info msg="StopPodSandbox for \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" returns successfully" Dec 13 14:38:06.686181 kubelet[2106]: E1213 14:38:06.686159 2106 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.686458 kubelet[2106]: E1213 14:38:06.686449 2106 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.686506 kubelet[2106]: E1213 14:38:06.686499 2106 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.686551 kubelet[2106]: E1213 14:38:06.686544 2106 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="flexvol-driver" Dec 13 14:38:06.686595 kubelet[2106]: E1213 14:38:06.686588 2106 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="install-cni" Dec 13 14:38:06.686658 kubelet[2106]: I1213 14:38:06.686650 2106 memory_manager.go:354] "RemoveStaleState removing state" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.686702 kubelet[2106]: I1213 14:38:06.686695 2106 memory_manager.go:354] "RemoveStaleState removing state" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.686777 kubelet[2106]: I1213 14:38:06.686770 2106 memory_manager.go:354] "RemoveStaleState removing state" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" containerName="calico-node" Dec 13 14:38:06.692626 systemd[1]: Created slice kubepods-besteffort-podc530f279_bbb6_4fb2_b84c_f0181aa5a5e2.slice. Dec 13 14:38:06.697351 kubelet[2106]: I1213 14:38:06.697324 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cf827bae-b749-4ffc-a34b-13b53b67ecfa-node-certs\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697351 kubelet[2106]: I1213 14:38:06.697351 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-lib-calico\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697511 kubelet[2106]: I1213 14:38:06.697489 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-xtables-lock\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697511 kubelet[2106]: I1213 14:38:06.697508 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cf827bae-b749-4ffc-a34b-13b53b67ecfa-tigera-ca-bundle\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697591 kubelet[2106]: I1213 14:38:06.697521 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-run-calico\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697591 kubelet[2106]: I1213 14:38:06.697531 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-net-dir\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697591 kubelet[2106]: I1213 14:38:06.697538 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-policysync\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697769 kubelet[2106]: I1213 14:38:06.697549 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"kube-api-access-c4slc\" (UniqueName: \"kubernetes.io/projected/cf827bae-b749-4ffc-a34b-13b53b67ecfa-kube-api-access-c4slc\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697812 kubelet[2106]: I1213 14:38:06.697771 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-bin-dir\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697812 kubelet[2106]: I1213 14:38:06.697783 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-flexvol-driver-host\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697812 kubelet[2106]: I1213 14:38:06.697792 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-lib-modules\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.697812 kubelet[2106]: I1213 14:38:06.697802 2106 reconciler_common.go:159] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-log-dir\") pod \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\" (UID: \"cf827bae-b749-4ffc-a34b-13b53b67ecfa\") " Dec 13 14:38:06.699345 kubelet[2106]: I1213 14:38:06.698854 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.699345 kubelet[2106]: I1213 14:38:06.698931 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.699345 kubelet[2106]: I1213 14:38:06.698966 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.699345 kubelet[2106]: I1213 14:38:06.698977 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.699345 kubelet[2106]: I1213 14:38:06.699142 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.699470 kubelet[2106]: I1213 14:38:06.699161 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-policysync" (OuterVolumeSpecName: "policysync") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.700006 kubelet[2106]: I1213 14:38:06.699993 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.700663 kubelet[2106]: I1213 14:38:06.700209 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.700722 kubelet[2106]: I1213 14:38:06.700222 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 14:38:06.714633 systemd[1]: var-lib-kubelet-pods-cf827bae\x2db749\x2d4ffc\x2da34b\x2d13b53b67ecfa-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dc4slc.mount: Deactivated successfully. Dec 13 14:38:06.714691 systemd[1]: var-lib-kubelet-pods-cf827bae\x2db749\x2d4ffc\x2da34b\x2d13b53b67ecfa-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 14:38:06.717867 systemd[1]: var-lib-kubelet-pods-cf827bae\x2db749\x2d4ffc\x2da34b\x2d13b53b67ecfa-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 14:38:06.720764 kubelet[2106]: I1213 14:38:06.720724 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/cf827bae-b749-4ffc-a34b-13b53b67ecfa-node-certs" (OuterVolumeSpecName: "node-certs") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 14:38:06.721126 kubelet[2106]: I1213 14:38:06.721106 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/cf827bae-b749-4ffc-a34b-13b53b67ecfa-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 14:38:06.722063 kubelet[2106]: I1213 14:38:06.721172 2106 operation_generator.go:803] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cf827bae-b749-4ffc-a34b-13b53b67ecfa-kube-api-access-c4slc" (OuterVolumeSpecName: "kube-api-access-c4slc") pod "cf827bae-b749-4ffc-a34b-13b53b67ecfa" (UID: "cf827bae-b749-4ffc-a34b-13b53b67ecfa"). InnerVolumeSpecName "kube-api-access-c4slc". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 14:38:06.798700 kubelet[2106]: I1213 14:38:06.798660 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-var-run-calico\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798700 kubelet[2106]: I1213 14:38:06.798698 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-cni-net-dir\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798951 kubelet[2106]: I1213 14:38:06.798717 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-lib-modules\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798951 kubelet[2106]: I1213 14:38:06.798728 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-node-certs\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798951 kubelet[2106]: I1213 14:38:06.798739 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-cni-log-dir\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798951 kubelet[2106]: I1213 14:38:06.798759 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-xtables-lock\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.798951 kubelet[2106]: I1213 14:38:06.798770 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-cni-bin-dir\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798784 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-flexvol-driver-host\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798805 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-tigera-ca-bundle\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798819 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-var-lib-calico\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798830 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rdwdw\" (UniqueName: \"kubernetes.io/projected/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-kube-api-access-rdwdw\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798844 2106 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c530f279-bbb6-4fb2-b84c-f0181aa5a5e2-policysync\") pod \"calico-node-mm92k\" (UID: \"c530f279-bbb6-4fb2-b84c-f0181aa5a5e2\") " pod="calico-system/calico-node-mm92k" Dec 13 14:38:06.799109 kubelet[2106]: I1213 14:38:06.798857 2106 reconciler_common.go:288] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-policysync\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798864 2106 reconciler_common.go:288] "Volume detached for volume \"kube-api-access-c4slc\" (UniqueName: \"kubernetes.io/projected/cf827bae-b749-4ffc-a34b-13b53b67ecfa-kube-api-access-c4slc\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798870 2106 reconciler_common.go:288] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798875 2106 reconciler_common.go:288] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798879 2106 reconciler_common.go:288] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798885 2106 reconciler_common.go:288] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798890 2106 reconciler_common.go:288] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-lib-modules\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798895 2106 reconciler_common.go:288] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/cf827bae-b749-4ffc-a34b-13b53b67ecfa-node-certs\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799654 kubelet[2106]: I1213 14:38:06.798901 2106 reconciler_common.go:288] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799833 kubelet[2106]: I1213 14:38:06.798906 2106 reconciler_common.go:288] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-xtables-lock\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799833 kubelet[2106]: I1213 14:38:06.798912 2106 reconciler_common.go:288] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cf827bae-b749-4ffc-a34b-13b53b67ecfa-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.799833 kubelet[2106]: I1213 14:38:06.798917 2106 reconciler_common.go:288] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/cf827bae-b749-4ffc-a34b-13b53b67ecfa-var-run-calico\") on node \"localhost\" DevicePath \"\"" Dec 13 14:38:06.943599 env[1267]: time="2024-12-13T14:38:06.943500610Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:38:06.964018 env[1267]: time="2024-12-13T14:38:06.963978384Z" level=error msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" failed" error="failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:38:06.964128 kubelet[2106]: E1213 14:38:06.964108 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:38:06.964162 kubelet[2106]: E1213 14:38:06.964139 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b"} Dec 13 14:38:06.964162 kubelet[2106]: E1213 14:38:06.964159 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:38:06.964229 kubelet[2106]: E1213 14:38:06.964172 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"137b900f-a1c0-406e-87c9-33eedf71f128\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rskds" podUID="137b900f-a1c0-406e-87c9-33eedf71f128" Dec 13 14:38:06.968992 systemd[1]: Removed slice kubepods-besteffort-podcf827bae_b749_4ffc_a34b_13b53b67ecfa.slice. Dec 13 14:38:06.999845 env[1267]: time="2024-12-13T14:38:06.999819941Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mm92k,Uid:c530f279-bbb6-4fb2-b84c-f0181aa5a5e2,Namespace:calico-system,Attempt:0,}" Dec 13 14:38:07.052398 env[1267]: time="2024-12-13T14:38:07.052353389Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:07.052534 env[1267]: time="2024-12-13T14:38:07.052519988Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:07.052597 env[1267]: time="2024-12-13T14:38:07.052584451Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:07.052872 env[1267]: time="2024-12-13T14:38:07.052844723Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81 pid=3835 runtime=io.containerd.runc.v2 Dec 13 14:38:07.060076 systemd[1]: Started cri-containerd-abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81.scope. Dec 13 14:38:07.077171 kernel: audit: type=1400 audit(1734100687.068:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077248 kernel: audit: type=1400 audit(1734100687.068:1042): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077271 kernel: audit: type=1400 audit(1734100687.068:1043): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077286 kernel: audit: type=1400 audit(1734100687.068:1044): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.079587 kernel: audit: type=1400 audit(1734100687.068:1045): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.081977 kernel: audit: type=1400 audit(1734100687.068:1046): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.084416 kernel: audit: type=1400 audit(1734100687.068:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.086869 kernel: audit: type=1400 audit(1734100687.068:1048): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.076000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.076000 audit: BPF prog-id=145 op=LOAD Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3835 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653630653462393336643334383137363134303036353161663432 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3835 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653630653462393336643334383137363134303036353161663432 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.077000 audit: BPF prog-id=146 op=LOAD Dec 13 14:38:07.077000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00024dce0 items=0 ppid=3835 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653630653462393336643334383137363134303036353161663432 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.083000 audit: BPF prog-id=147 op=LOAD Dec 13 14:38:07.083000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00024dd28 items=0 ppid=3835 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653630653462393336643334383137363134303036353161663432 Dec 13 14:38:07.088000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:38:07.088000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { perfmon } for pid=3846 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit[3846]: AVC avc: denied { bpf } for pid=3846 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.088000 audit: BPF prog-id=148 op=LOAD Dec 13 14:38:07.088000 audit[3846]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003b4138 items=0 ppid=3835 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162653630653462393336643334383137363134303036353161663432 Dec 13 14:38:07.105577 env[1267]: time="2024-12-13T14:38:07.101233742Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mm92k,Uid:c530f279-bbb6-4fb2-b84c-f0181aa5a5e2,Namespace:calico-system,Attempt:0,} returns sandbox id \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\"" Dec 13 14:38:07.105577 env[1267]: time="2024-12-13T14:38:07.103528997Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:38:07.126812 kubelet[2106]: I1213 14:38:07.126434 2106 scope.go:117] "RemoveContainer" containerID="b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672" Dec 13 14:38:07.128129 env[1267]: time="2024-12-13T14:38:07.127953555Z" level=info msg="RemoveContainer for \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\"" Dec 13 14:38:07.139697 env[1267]: time="2024-12-13T14:38:07.139656467Z" level=info msg="RemoveContainer for \"b7d2421301a503564badcd2de7ff720ae82fe9016649102b31e4017c3bf4c672\" returns successfully" Dec 13 14:38:07.140110 kubelet[2106]: I1213 14:38:07.140014 2106 scope.go:117] "RemoveContainer" containerID="cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec" Dec 13 14:38:07.149630 env[1267]: time="2024-12-13T14:38:07.149607953Z" level=info msg="RemoveContainer for \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\"" Dec 13 14:38:07.238974 env[1267]: time="2024-12-13T14:38:07.238945084Z" level=info msg="RemoveContainer for \"cee98a27b1af4378b0cb3803611c93582fbaf57a18390977d2d1ca34e216d7ec\" returns successfully" Dec 13 14:38:07.239337 kubelet[2106]: I1213 14:38:07.239249 2106 scope.go:117] "RemoveContainer" containerID="7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e" Dec 13 14:38:07.249643 env[1267]: time="2024-12-13T14:38:07.249611389Z" level=info msg="RemoveContainer for \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\"" Dec 13 14:38:07.263170 env[1267]: time="2024-12-13T14:38:07.263140781Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3\"" Dec 13 14:38:07.263727 env[1267]: time="2024-12-13T14:38:07.263703617Z" level=info msg="StartContainer for \"9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3\"" Dec 13 14:38:07.275796 env[1267]: time="2024-12-13T14:38:07.275767656Z" level=info msg="RemoveContainer for \"7f41d9c7906f330b2cef9199d9369246f8f6086cfd0bcf39a95b97da4912980e\" returns successfully" Dec 13 14:38:07.279131 systemd[1]: Started cri-containerd-9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3.scope. Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f60806a3a88 items=0 ppid=3835 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636664363261353334303936393239356662313238396632653136 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit: BPF prog-id=149 op=LOAD Dec 13 14:38:07.293000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030c208 items=0 ppid=3835 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636664363261353334303936393239356662313238396632653136 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit: BPF prog-id=150 op=LOAD Dec 13 14:38:07.293000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030c258 items=0 ppid=3835 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636664363261353334303936393239356662313238396632653136 Dec 13 14:38:07.293000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:38:07.293000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { perfmon } for pid=3877 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit[3877]: AVC avc: denied { bpf } for pid=3877 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:07.293000 audit: BPF prog-id=151 op=LOAD Dec 13 14:38:07.293000 audit[3877]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030c2e8 items=0 ppid=3835 pid=3877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:07.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964636664363261353334303936393239356662313238396632653136 Dec 13 14:38:07.303005 env[1267]: time="2024-12-13T14:38:07.302976803Z" level=info msg="StartContainer for \"9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3\" returns successfully" Dec 13 14:38:07.380629 systemd[1]: cri-containerd-9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3.scope: Deactivated successfully. Dec 13 14:38:07.383000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:38:07.405819 env[1267]: time="2024-12-13T14:38:07.405790055Z" level=info msg="shim disconnected" id=9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3 Dec 13 14:38:07.405985 env[1267]: time="2024-12-13T14:38:07.405973456Z" level=warning msg="cleaning up after shim disconnected" id=9dcfd62a5340969295fb1289f2e161758a71de844ba807823784ee048d374ec3 namespace=k8s.io Dec 13 14:38:07.406050 env[1267]: time="2024-12-13T14:38:07.406040076Z" level=info msg="cleaning up dead shim" Dec 13 14:38:07.410995 env[1267]: time="2024-12-13T14:38:07.410966856Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:38:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3915 runtime=io.containerd.runc.v2\n" Dec 13 14:38:08.135333 env[1267]: time="2024-12-13T14:38:08.135125235Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:38:08.144768 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount283462918.mount: Deactivated successfully. Dec 13 14:38:08.147182 env[1267]: time="2024-12-13T14:38:08.147131114Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237\"" Dec 13 14:38:08.147840 env[1267]: time="2024-12-13T14:38:08.147787398Z" level=info msg="StartContainer for \"ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237\"" Dec 13 14:38:08.164433 systemd[1]: Started cri-containerd-ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237.scope. Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f0f304632e8 items=0 ppid=3835 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346639323133653463623433383235353936653137623863663635 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit: BPF prog-id=152 op=LOAD Dec 13 14:38:08.178000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003b40c8 items=0 ppid=3835 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346639323133653463623433383235353936653137623863663635 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit: BPF prog-id=153 op=LOAD Dec 13 14:38:08.178000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003b4118 items=0 ppid=3835 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346639323133653463623433383235353936653137623863663635 Dec 13 14:38:08.178000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:38:08.178000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:08.178000 audit: BPF prog-id=154 op=LOAD Dec 13 14:38:08.178000 audit[3936]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003b41a8 items=0 ppid=3835 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:08.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162346639323133653463623433383235353936653137623863663635 Dec 13 14:38:08.197633 env[1267]: time="2024-12-13T14:38:08.197600074Z" level=info msg="StartContainer for \"ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237\" returns successfully" Dec 13 14:38:08.615871 systemd[1]: run-containerd-runc-k8s.io-ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237-runc.D4EfMW.mount: Deactivated successfully. Dec 13 14:38:08.944273 env[1267]: time="2024-12-13T14:38:08.944201551Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:38:08.944793 env[1267]: time="2024-12-13T14:38:08.944778770Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:38:08.944882 kubelet[2106]: I1213 14:38:08.944867 2106 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="cf827bae-b749-4ffc-a34b-13b53b67ecfa" path="/var/lib/kubelet/pods/cf827bae-b749-4ffc-a34b-13b53b67ecfa/volumes" Dec 13 14:38:08.973978 env[1267]: time="2024-12-13T14:38:08.973872200Z" level=error msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" failed" error="failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:38:08.974076 kubelet[2106]: E1213 14:38:08.974003 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:38:08.974076 kubelet[2106]: E1213 14:38:08.974034 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead"} Dec 13 14:38:08.974076 kubelet[2106]: E1213 14:38:08.974056 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:38:08.974076 kubelet[2106]: E1213 14:38:08.974070 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c6d1116b-f94f-4e6c-a472-6990e3046598\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podUID="c6d1116b-f94f-4e6c-a472-6990e3046598" Dec 13 14:38:08.976940 env[1267]: time="2024-12-13T14:38:08.976866377Z" level=error msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" failed" error="failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:38:08.976989 kubelet[2106]: E1213 14:38:08.976945 2106 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:38:08.976989 kubelet[2106]: E1213 14:38:08.976967 2106 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6"} Dec 13 14:38:08.977047 kubelet[2106]: E1213 14:38:08.976984 2106 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:38:08.977047 kubelet[2106]: E1213 14:38:08.976998 2106 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61699123-ed1d-4a68-b972-8f873921908d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-v5ctd" podUID="61699123-ed1d-4a68-b972-8f873921908d" Dec 13 14:38:09.408678 env[1267]: time="2024-12-13T14:38:09.408618857Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: failed to load CNI config list file /etc/cni/net.d/10-calico.conflist: error parsing configuration list: unexpected end of JSON input: invalid cni config: failed to load cni config" Dec 13 14:38:09.410053 systemd[1]: cri-containerd-ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237.scope: Deactivated successfully. Dec 13 14:38:09.413000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:38:09.425450 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237-rootfs.mount: Deactivated successfully. Dec 13 14:38:09.428442 env[1267]: time="2024-12-13T14:38:09.428408652Z" level=info msg="shim disconnected" id=ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237 Dec 13 14:38:09.428442 env[1267]: time="2024-12-13T14:38:09.428437170Z" level=warning msg="cleaning up after shim disconnected" id=ab4f9213e4cb43825596e17b8cf65793ed6678b8bd6c66bf316cae984f104237 namespace=k8s.io Dec 13 14:38:09.428544 env[1267]: time="2024-12-13T14:38:09.428443176Z" level=info msg="cleaning up dead shim" Dec 13 14:38:09.433251 env[1267]: time="2024-12-13T14:38:09.433231907Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:38:09Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4019 runtime=io.containerd.runc.v2\n" Dec 13 14:38:10.151531 env[1267]: time="2024-12-13T14:38:10.151504317Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:38:10.158671 env[1267]: time="2024-12-13T14:38:10.158594404Z" level=info msg="CreateContainer within sandbox \"abe60e4b936d3481761400651af42ab28797abe17c03584e45a35198520d2e81\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb\"" Dec 13 14:38:10.159259 env[1267]: time="2024-12-13T14:38:10.159218247Z" level=info msg="StartContainer for \"bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb\"" Dec 13 14:38:10.178115 systemd[1]: Started cri-containerd-bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb.scope. Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f786c258ee8 items=0 ppid=3835 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:10.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313333316230323932383033323531633938346335646333643630 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit: BPF prog-id=155 op=LOAD Dec 13 14:38:10.189000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d4198 items=0 ppid=3835 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:10.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313333316230323932383033323531633938346335646333643630 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.189000 audit: BPF prog-id=156 op=LOAD Dec 13 14:38:10.189000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003d41e8 items=0 ppid=3835 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:10.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313333316230323932383033323531633938346335646333643630 Dec 13 14:38:10.189000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:38:10.190000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:10.190000 audit: BPF prog-id=157 op=LOAD Dec 13 14:38:10.190000 audit[4042]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003d4278 items=0 ppid=3835 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:10.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266313333316230323932383033323531633938346335646333643630 Dec 13 14:38:10.200433 env[1267]: time="2024-12-13T14:38:10.200403974Z" level=info msg="StartContainer for \"bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb\" returns successfully" Dec 13 14:38:10.943123 env[1267]: time="2024-12-13T14:38:10.943099569Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:38:11.169448 systemd[1]: run-containerd-runc-k8s.io-bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb-runc.GA3M0r.mount: Deactivated successfully. Dec 13 14:38:11.188192 kubelet[2106]: I1213 14:38:11.188067 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-mm92k" podStartSLOduration=5.188050156 podStartE2EDuration="5.188050156s" podCreationTimestamp="2024-12-13 14:38:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:38:11.15654297 +0000 UTC m=+76.401070079" watchObservedRunningTime="2024-12-13 14:38:11.188050156 +0000 UTC m=+76.432577260" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.188 [INFO][4105] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.188 [INFO][4105] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" iface="eth0" netns="/var/run/netns/cni-a95d7dc1-7834-0efb-3698-7b3d3f161725" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.195 [INFO][4105] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" iface="eth0" netns="/var/run/netns/cni-a95d7dc1-7834-0efb-3698-7b3d3f161725" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.196 [INFO][4105] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" iface="eth0" netns="/var/run/netns/cni-a95d7dc1-7834-0efb-3698-7b3d3f161725" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.196 [INFO][4105] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.196 [INFO][4105] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.233 [INFO][4132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.234 [INFO][4132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.234 [INFO][4132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.240 [WARNING][4132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.240 [INFO][4132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.241 [INFO][4132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:11.243431 env[1267]: 2024-12-13 14:38:11.242 [INFO][4105] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:38:11.244867 systemd[1]: run-netns-cni\x2da95d7dc1\x2d7834\x2d0efb\x2d3698\x2d7b3d3f161725.mount: Deactivated successfully. Dec 13 14:38:11.245635 env[1267]: time="2024-12-13T14:38:11.245603959Z" level=info msg="TearDown network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" successfully" Dec 13 14:38:11.245668 env[1267]: time="2024-12-13T14:38:11.245635516Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" returns successfully" Dec 13 14:38:11.246089 env[1267]: time="2024-12-13T14:38:11.246070461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-6ztsn,Uid:1c486ab2-af5a-49b0-bbba-d82678b97543,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:38:11.349331 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:38:11.349403 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia21fd325bce: link becomes ready Dec 13 14:38:11.356061 systemd-networkd[1063]: calia21fd325bce: Link UP Dec 13 14:38:11.356161 systemd-networkd[1063]: calia21fd325bce: Gained carrier Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.265 [INFO][4140] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.272 [INFO][4140] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0 calico-apiserver-85f8cf69df- calico-apiserver 1c486ab2-af5a-49b0-bbba-d82678b97543 873 0 2024-12-13 14:37:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85f8cf69df projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-85f8cf69df-6ztsn eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia21fd325bce [] []}} ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.273 [INFO][4140] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.300 [INFO][4152] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" HandleID="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.306 [INFO][4152] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" HandleID="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031bc50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-85f8cf69df-6ztsn", "timestamp":"2024-12-13 14:38:11.300687156 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.306 [INFO][4152] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.306 [INFO][4152] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.306 [INFO][4152] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.307 [INFO][4152] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.310 [INFO][4152] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.314 [INFO][4152] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.315 [INFO][4152] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.316 [INFO][4152] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.316 [INFO][4152] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.317 [INFO][4152] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8 Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.319 [INFO][4152] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.323 [INFO][4152] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.323 [INFO][4152] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" host="localhost" Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.323 [INFO][4152] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:11.360981 env[1267]: 2024-12-13 14:38:11.323 [INFO][4152] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" HandleID="k8s-pod-network.6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.324 [INFO][4140] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c486ab2-af5a-49b0-bbba-d82678b97543", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-85f8cf69df-6ztsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia21fd325bce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.324 [INFO][4140] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.325 [INFO][4140] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia21fd325bce ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.349 [INFO][4140] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.350 [INFO][4140] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c486ab2-af5a-49b0-bbba-d82678b97543", ResourceVersion:"873", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8", Pod:"calico-apiserver-85f8cf69df-6ztsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia21fd325bce", MAC:"72:75:a3:16:7f:57", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:11.363357 env[1267]: 2024-12-13 14:38:11.356 [INFO][4140] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-6ztsn" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:38:11.370418 env[1267]: time="2024-12-13T14:38:11.370370530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:11.370418 env[1267]: time="2024-12-13T14:38:11.370414878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:11.370551 env[1267]: time="2024-12-13T14:38:11.370430050Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:11.370641 env[1267]: time="2024-12-13T14:38:11.370614526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8 pid=4179 runtime=io.containerd.runc.v2 Dec 13 14:38:11.381318 systemd[1]: Started cri-containerd-6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8.scope. Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.391000 audit: BPF prog-id=158 op=LOAD Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4179 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626164346563366664356230623733323563396539323964316461 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4179 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626164346563366664356230623733323563396539323964316461 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit: BPF prog-id=159 op=LOAD Dec 13 14:38:11.394000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ca5f0 items=0 ppid=4179 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626164346563366664356230623733323563396539323964316461 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit: BPF prog-id=160 op=LOAD Dec 13 14:38:11.394000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ca638 items=0 ppid=4179 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626164346563366664356230623733323563396539323964316461 Dec 13 14:38:11.394000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:38:11.394000 audit: BPF prog-id=159 op=UNLOAD Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { perfmon } for pid=4188 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit[4188]: AVC avc: denied { bpf } for pid=4188 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.394000 audit: BPF prog-id=161 op=LOAD Dec 13 14:38:11.394000 audit[4188]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003caa48 items=0 ppid=4179 pid=4188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663626164346563366664356230623733323563396539323964316461 Dec 13 14:38:11.395564 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:11.425237 env[1267]: time="2024-12-13T14:38:11.425203561Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-6ztsn,Uid:1c486ab2-af5a-49b0-bbba-d82678b97543,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8\"" Dec 13 14:38:11.426330 env[1267]: time="2024-12-13T14:38:11.426313713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:38:11.626133 kernel: kauditd_printk_skb: 237 callbacks suppressed Dec 13 14:38:11.626222 kernel: audit: type=1400 audit(1734100691.622:1097): avc: denied { write } for pid=4284 comm="tee" name="fd" dev="proc" ino=37452 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.622000 audit[4284]: AVC avc: denied { write } for pid=4284 comm="tee" name="fd" dev="proc" ino=37452 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.630185 kernel: audit: type=1300 audit(1734100691.622:1097): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc054caa1e a2=241 a3=1b6 items=1 ppid=4225 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.622000 audit[4284]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc054caa1e a2=241 a3=1b6 items=1 ppid=4225 pid=4284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.622000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:38:11.636640 kernel: audit: type=1307 audit(1734100691.622:1097): cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:38:11.636700 kernel: audit: type=1302 audit(1734100691.622:1097): item=0 name="/dev/fd/63" inode=38477 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.622000 audit: PATH item=0 name="/dev/fd/63" inode=38477 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.622000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.641651 kernel: audit: type=1327 audit(1734100691.622:1097): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.641713 kernel: audit: type=1400 audit(1734100691.628:1098): avc: denied { write } for pid=4259 comm="tee" name="fd" dev="proc" ino=37456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.646374 kernel: audit: type=1300 audit(1734100691.628:1098): arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf6054a1f a2=241 a3=1b6 items=1 ppid=4227 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.628000 audit[4259]: AVC avc: denied { write } for pid=4259 comm="tee" name="fd" dev="proc" ino=37456 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.628000 audit[4259]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf6054a1f a2=241 a3=1b6 items=1 ppid=4227 pid=4259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.628000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:38:11.652536 kernel: audit: type=1307 audit(1734100691.628:1098): cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:38:11.652574 kernel: audit: type=1302 audit(1734100691.628:1098): item=0 name="/dev/fd/63" inode=38470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.628000 audit: PATH item=0 name="/dev/fd/63" inode=38470 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.654794 kernel: audit: type=1327 audit(1734100691.628:1098): proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.628000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.649000 audit[4255]: AVC avc: denied { write } for pid=4255 comm="tee" name="fd" dev="proc" ino=37461 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.649000 audit[4255]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd97cba30 a2=241 a3=1b6 items=1 ppid=4230 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.649000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:38:11.649000 audit: PATH item=0 name="/dev/fd/63" inode=38467 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.649000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.654000 audit[4253]: AVC avc: denied { write } for pid=4253 comm="tee" name="fd" dev="proc" ino=37465 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.654000 audit[4253]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe87906a2f a2=241 a3=1b6 items=1 ppid=4222 pid=4253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.654000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:38:11.654000 audit: PATH item=0 name="/dev/fd/63" inode=37439 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.654000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.657000 audit[4279]: AVC avc: denied { write } for pid=4279 comm="tee" name="fd" dev="proc" ino=37469 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.657000 audit[4279]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffee5d8a2e a2=241 a3=1b6 items=1 ppid=4229 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.657000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:38:11.657000 audit: PATH item=0 name="/dev/fd/63" inode=37447 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.657000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.667000 audit[4258]: AVC avc: denied { write } for pid=4258 comm="tee" name="fd" dev="proc" ino=38490 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.667000 audit[4258]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff94f72a2e a2=241 a3=1b6 items=1 ppid=4221 pid=4258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.667000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:38:11.667000 audit: PATH item=0 name="/dev/fd/63" inode=37444 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.667000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.681000 audit[4288]: AVC avc: denied { write } for pid=4288 comm="tee" name="fd" dev="proc" ino=38494 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:38:11.681000 audit[4288]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc757d2a2e a2=241 a3=1b6 items=1 ppid=4233 pid=4288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.681000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:38:11.681000 audit: PATH item=0 name="/dev/fd/63" inode=37449 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:38:11.681000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.829000 audit: BPF prog-id=162 op=LOAD Dec 13 14:38:11.829000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff1226d160 a2=98 a3=3 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.829000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.829000 audit: BPF prog-id=162 op=UNLOAD Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit: BPF prog-id=163 op=LOAD Dec 13 14:38:11.830000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1226cf40 a2=74 a3=540051 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.830000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.830000 audit: BPF prog-id=163 op=UNLOAD Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.830000 audit: BPF prog-id=164 op=LOAD Dec 13 14:38:11.830000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1226cf70 a2=94 a3=2 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.830000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.830000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.902000 audit: BPF prog-id=165 op=LOAD Dec 13 14:38:11.902000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff1226ce30 a2=40 a3=1 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.902000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.903000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:38:11.903000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.903000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff1226cf00 a2=50 a3=7fff1226cfe0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.903000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ce40 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1226ce70 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1226cd80 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ce90 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ce70 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ce60 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ce90 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1226ce70 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1226ce90 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff1226ce60 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff1226ced0 a2=28 a3=0 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1226cc80 a2=50 a3=1 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit: BPF prog-id=166 op=LOAD Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff1226cc80 a2=94 a3=5 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff1226cd30 a2=50 a3=1 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff1226ce50 a2=4 a3=38 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { confidentiality } for pid=4331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1226cea0 a2=94 a3=6 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.911000 audit[4331]: AVC avc: denied { confidentiality } for pid=4331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:11.911000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1226c650 a2=94 a3=83 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.911000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.912000 audit[4331]: AVC avc: denied { confidentiality } for pid=4331 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:11.912000 audit[4331]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff1226c650 a2=94 a3=83 items=0 ppid=4223 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.912000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit: BPF prog-id=167 op=LOAD Dec 13 14:38:11.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce33227b0 a2=98 a3=1999999999999999 items=0 ppid=4223 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.933000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:38:11.933000 audit: BPF prog-id=167 op=UNLOAD Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit: BPF prog-id=168 op=LOAD Dec 13 14:38:11.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce3322690 a2=74 a3=ffff items=0 ppid=4223 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.933000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:38:11.933000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:11.933000 audit: BPF prog-id=169 op=LOAD Dec 13 14:38:11.933000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffce33226d0 a2=40 a3=7ffce33228b0 items=0 ppid=4223 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:11.933000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:38:11.933000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:38:11.943462 env[1267]: time="2024-12-13T14:38:11.943245801Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:38:11.984215 systemd-networkd[1063]: vxlan.calico: Link UP Dec 13 14:38:11.984221 systemd-networkd[1063]: vxlan.calico: Gained carrier Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.014000 audit: BPF prog-id=170 op=LOAD Dec 13 14:38:12.014000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc76c92c30 a2=98 a3=ffffffff items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.014000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.014000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit: BPF prog-id=171 op=LOAD Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc76c92a40 a2=74 a3=540051 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit: BPF prog-id=171 op=UNLOAD Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit: BPF prog-id=172 op=LOAD Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc76c92a70 a2=94 a3=2 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c92940 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc76c92970 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc76c92880 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c92990 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c92970 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c92960 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c92990 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc76c92970 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc76c92990 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc76c92960 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc76c929d0 a2=28 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.015000 audit: BPF prog-id=173 op=LOAD Dec 13 14:38:12.015000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc76c92840 a2=40 a3=0 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.015000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.015000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc76c92830 a2=50 a3=2800 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc76c92830 a2=50 a3=2800 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit: BPF prog-id=174 op=LOAD Dec 13 14:38:12.016000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc76c92050 a2=94 a3=2 items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.016000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { perfmon } for pid=4380 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit[4380]: AVC avc: denied { bpf } for pid=4380 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.016000 audit: BPF prog-id=175 op=LOAD Dec 13 14:38:12.016000 audit[4380]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc76c92150 a2=94 a3=2d items=0 ppid=4223 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit: BPF prog-id=176 op=LOAD Dec 13 14:38:12.029000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffec972ace0 a2=98 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.029000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit: BPF prog-id=177 op=LOAD Dec 13 14:38:12.029000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec972aac0 a2=74 a3=540051 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.029000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.029000 audit: BPF prog-id=178 op=LOAD Dec 13 14:38:12.029000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec972aaf0 a2=94 a3=2 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.029000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.029000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" iface="eth0" netns="/var/run/netns/cni-ff3a00c7-0928-9cf6-9883-73f75e9b6fac" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" iface="eth0" netns="/var/run/netns/cni-ff3a00c7-0928-9cf6-9883-73f75e9b6fac" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" iface="eth0" netns="/var/run/netns/cni-ff3a00c7-0928-9cf6-9883-73f75e9b6fac" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.085 [INFO][4361] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.141 [INFO][4397] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.150 [INFO][4397] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.150 [INFO][4397] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.158 [WARNING][4397] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.158 [INFO][4397] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.160 [INFO][4397] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:12.167987 env[1267]: 2024-12-13 14:38:12.163 [INFO][4361] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:38:12.172543 env[1267]: time="2024-12-13T14:38:12.171576628Z" level=info msg="TearDown network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" successfully" Dec 13 14:38:12.172543 env[1267]: time="2024-12-13T14:38:12.171619159Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" returns successfully" Dec 13 14:38:12.170895 systemd[1]: run-netns-cni\x2dff3a00c7\x2d0928\x2d9cf6\x2d9883\x2d73f75e9b6fac.mount: Deactivated successfully. Dec 13 14:38:12.174115 env[1267]: time="2024-12-13T14:38:12.173794600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-pjb27,Uid:9707d41e-752b-4a91-9ca8-26fd0005b824,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit: BPF prog-id=179 op=LOAD Dec 13 14:38:12.173000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffec972a9b0 a2=40 a3=1 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.173000 audit: BPF prog-id=179 op=UNLOAD Dec 13 14:38:12.173000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.173000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffec972aa80 a2=50 a3=7ffec972ab60 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.173000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972a9c0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec972a9f0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec972a900 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972aa10 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972a9f0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972a9e0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972aa10 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec972a9f0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec972aa10 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffec972a9e0 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffec972aa50 a2=28 a3=0 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec972a800 a2=50 a3=1 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit: BPF prog-id=180 op=LOAD Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffec972a800 a2=94 a3=5 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffec972a8b0 a2=50 a3=1 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffec972a9d0 a2=4 a3=38 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.186000 audit[4382]: AVC avc: denied { confidentiality } for pid=4382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:12.186000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec972aa20 a2=94 a3=6 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.186000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.187000 audit[4382]: AVC avc: denied { confidentiality } for pid=4382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:12.187000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec972a1d0 a2=94 a3=83 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.187000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { confidentiality } for pid=4382 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:38:12.188000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffec972a1d0 a2=94 a3=83 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec972bc10 a2=10 a3=f1f00800 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec972bab0 a2=10 a3=3 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec972ba50 a2=10 a3=3 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.188000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.188000 audit[4382]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffec972ba50 a2=10 a3=7 items=0 ppid=4223 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.188000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:38:12.204000 audit: BPF prog-id=175 op=UNLOAD Dec 13 14:38:12.284577 systemd-networkd[1063]: cali5466d1b5fa1: Link UP Dec 13 14:38:12.286205 systemd-networkd[1063]: cali5466d1b5fa1: Gained carrier Dec 13 14:38:12.286813 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5466d1b5fa1: link becomes ready Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.230 [INFO][4426] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0 calico-apiserver-85f8cf69df- calico-apiserver 9707d41e-752b-4a91-9ca8-26fd0005b824 882 0 2024-12-13 14:37:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:85f8cf69df projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-85f8cf69df-pjb27 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5466d1b5fa1 [] []}} ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.230 [INFO][4426] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.259 [INFO][4445] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" HandleID="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.264 [INFO][4445] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" HandleID="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050d30), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-85f8cf69df-pjb27", "timestamp":"2024-12-13 14:38:12.259939565 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.265 [INFO][4445] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.265 [INFO][4445] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.265 [INFO][4445] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.267 [INFO][4445] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.268 [INFO][4445] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.270 [INFO][4445] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.271 [INFO][4445] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.272 [INFO][4445] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.272 [INFO][4445] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.273 [INFO][4445] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.276 [INFO][4445] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.280 [INFO][4445] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.280 [INFO][4445] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" host="localhost" Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.280 [INFO][4445] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:12.302113 env[1267]: 2024-12-13 14:38:12.280 [INFO][4445] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" HandleID="k8s-pod-network.bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.281 [INFO][4426] cni-plugin/k8s.go 386: Populated endpoint ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9707d41e-752b-4a91-9ca8-26fd0005b824", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-85f8cf69df-pjb27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5466d1b5fa1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.281 [INFO][4426] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.281 [INFO][4426] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5466d1b5fa1 ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.286 [INFO][4426] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.287 [INFO][4426] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9707d41e-752b-4a91-9ca8-26fd0005b824", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d", Pod:"calico-apiserver-85f8cf69df-pjb27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5466d1b5fa1", MAC:"5e:88:c6:f9:08:ab", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:12.304328 env[1267]: 2024-12-13 14:38:12.293 [INFO][4426] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d" Namespace="calico-apiserver" Pod="calico-apiserver-85f8cf69df-pjb27" WorkloadEndpoint="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:38:12.306000 audit[4466]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:12.306000 audit[4466]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc54a14c70 a2=0 a3=7ffc54a14c5c items=0 ppid=4223 pid=4466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.306000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:12.312000 audit[4467]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:12.312000 audit[4467]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd6ec72940 a2=0 a3=7ffd6ec7292c items=0 ppid=4223 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.312000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:12.314251 env[1267]: time="2024-12-13T14:38:12.314028233Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:12.314251 env[1267]: time="2024-12-13T14:38:12.314077669Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:12.314251 env[1267]: time="2024-12-13T14:38:12.314098637Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:12.314251 env[1267]: time="2024-12-13T14:38:12.314194603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d pid=4489 runtime=io.containerd.runc.v2 Dec 13 14:38:12.314000 audit[4465]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4465 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:12.314000 audit[4465]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffd137f9c20 a2=0 a3=7ffd137f9c0c items=0 ppid=4223 pid=4465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.314000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:12.321000 audit[4478]: NETFILTER_CFG table=filter:100 family=2 entries=75 op=nft_register_chain pid=4478 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:12.321000 audit[4478]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffe464c1b10 a2=0 a3=7ffe464c1afc items=0 ppid=4223 pid=4478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.321000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:12.324318 systemd[1]: Started cri-containerd-bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d.scope. Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.333000 audit: BPF prog-id=181 op=LOAD Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4489 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262663135313433646339396232623934643839663331376262306630 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4489 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262663135313433646339396232623934643839663331376262306630 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit: BPF prog-id=182 op=LOAD Dec 13 14:38:12.334000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000307080 items=0 ppid=4489 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262663135313433646339396232623934643839663331376262306630 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit: BPF prog-id=183 op=LOAD Dec 13 14:38:12.334000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003070c8 items=0 ppid=4489 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262663135313433646339396232623934643839663331376262306630 Dec 13 14:38:12.334000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:38:12.334000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { perfmon } for pid=4497 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit[4497]: AVC avc: denied { bpf } for pid=4497 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:12.334000 audit: BPF prog-id=184 op=LOAD Dec 13 14:38:12.334000 audit[4497]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003074d8 items=0 ppid=4489 pid=4497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262663135313433646339396232623934643839663331376262306630 Dec 13 14:38:12.336004 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:12.357000 audit[4522]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4522 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:12.357000 audit[4522]: SYSCALL arch=c000003e syscall=46 success=yes exit=20328 a0=3 a1=7ffe005a5060 a2=0 a3=7ffe005a504c items=0 ppid=4223 pid=4522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:12.357000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:12.359626 env[1267]: time="2024-12-13T14:38:12.359597798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-85f8cf69df-pjb27,Uid:9707d41e-752b-4a91-9ca8-26fd0005b824,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d\"" Dec 13 14:38:12.771916 systemd-networkd[1063]: calia21fd325bce: Gained IPv6LL Dec 13 14:38:13.155844 systemd-networkd[1063]: vxlan.calico: Gained IPv6LL Dec 13 14:38:13.185320 systemd[1]: run-containerd-runc-k8s.io-bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb-runc.8fHFu1.mount: Deactivated successfully. Dec 13 14:38:13.539875 systemd-networkd[1063]: cali5466d1b5fa1: Gained IPv6LL Dec 13 14:38:14.453770 env[1267]: time="2024-12-13T14:38:14.453732647Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.454775 env[1267]: time="2024-12-13T14:38:14.454756947Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.455726 env[1267]: time="2024-12-13T14:38:14.455708988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.456556 env[1267]: time="2024-12-13T14:38:14.456538912Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.456842 env[1267]: time="2024-12-13T14:38:14.456823429Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:38:14.459588 env[1267]: time="2024-12-13T14:38:14.459567620Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:38:14.466120 env[1267]: time="2024-12-13T14:38:14.466094006Z" level=info msg="CreateContainer within sandbox \"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:38:14.474643 env[1267]: time="2024-12-13T14:38:14.472648884Z" level=info msg="CreateContainer within sandbox \"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"d625e6342a578deca527e5923186491c8a4bb5b3a0fad72880403975cfbdb990\"" Dec 13 14:38:14.475806 env[1267]: time="2024-12-13T14:38:14.475181309Z" level=info msg="StartContainer for \"d625e6342a578deca527e5923186491c8a4bb5b3a0fad72880403975cfbdb990\"" Dec 13 14:38:14.489780 systemd[1]: Started cri-containerd-d625e6342a578deca527e5923186491c8a4bb5b3a0fad72880403975cfbdb990.scope. Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.508000 audit: BPF prog-id=185 op=LOAD Dec 13 14:38:14.509000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.509000 audit[4561]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4179 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.509000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323565363334326135373864656361353237653539323331383634 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4179 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323565363334326135373864656361353237653539323331383634 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit: BPF prog-id=186 op=LOAD Dec 13 14:38:14.510000 audit[4561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029aee0 items=0 ppid=4179 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323565363334326135373864656361353237653539323331383634 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit: BPF prog-id=187 op=LOAD Dec 13 14:38:14.510000 audit[4561]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029af28 items=0 ppid=4179 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323565363334326135373864656361353237653539323331383634 Dec 13 14:38:14.510000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:38:14.510000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { perfmon } for pid=4561 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit[4561]: AVC avc: denied { bpf } for pid=4561 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.510000 audit: BPF prog-id=188 op=LOAD Dec 13 14:38:14.510000 audit[4561]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029b338 items=0 ppid=4179 pid=4561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436323565363334326135373864656361353237653539323331383634 Dec 13 14:38:14.541775 env[1267]: time="2024-12-13T14:38:14.540978595Z" level=info msg="StartContainer for \"d625e6342a578deca527e5923186491c8a4bb5b3a0fad72880403975cfbdb990\" returns successfully" Dec 13 14:38:14.900992 env[1267]: time="2024-12-13T14:38:14.900961968Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.903035 env[1267]: time="2024-12-13T14:38:14.903016420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.904571 env[1267]: time="2024-12-13T14:38:14.904551340Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 14:38:14.904741 env[1267]: time="2024-12-13T14:38:14.904726493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.905104 env[1267]: time="2024-12-13T14:38:14.905085332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:14.907030 env[1267]: time="2024-12-13T14:38:14.907013665Z" level=info msg="CreateContainer within sandbox \"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:38:14.917754 env[1267]: time="2024-12-13T14:38:14.917722995Z" level=info msg="CreateContainer within sandbox \"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9c448f7f209b689c1f497a23e8704096ee3f0066e57014d9237a0b134cd96c19\"" Dec 13 14:38:14.918236 env[1267]: time="2024-12-13T14:38:14.918217681Z" level=info msg="StartContainer for \"9c448f7f209b689c1f497a23e8704096ee3f0066e57014d9237a0b134cd96c19\"" Dec 13 14:38:14.934443 systemd[1]: Started cri-containerd-9c448f7f209b689c1f497a23e8704096ee3f0066e57014d9237a0b134cd96c19.scope. Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.954000 audit: BPF prog-id=189 op=LOAD Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4489 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963343438663766323039623638396331663439376132336538373034 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4489 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963343438663766323039623638396331663439376132336538373034 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit: BPF prog-id=190 op=LOAD Dec 13 14:38:14.955000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001979d8 a2=78 a3=c000220810 items=0 ppid=4489 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963343438663766323039623638396331663439376132336538373034 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit: BPF prog-id=191 op=LOAD Dec 13 14:38:14.955000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=19 a0=5 a1=c000197770 a2=78 a3=c000220858 items=0 ppid=4489 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963343438663766323039623638396331663439376132336538373034 Dec 13 14:38:14.955000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:38:14.955000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { perfmon } for pid=4602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit[4602]: AVC avc: denied { bpf } for pid=4602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:14.955000 audit: BPF prog-id=192 op=LOAD Dec 13 14:38:14.955000 audit[4602]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197c30 a2=78 a3=c000220c68 items=0 ppid=4489 pid=4602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:14.955000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963343438663766323039623638396331663439376132336538373034 Dec 13 14:38:14.960204 env[1267]: time="2024-12-13T14:38:14.959930937Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:38:14.993342 env[1267]: time="2024-12-13T14:38:14.993311812Z" level=info msg="StartContainer for \"9c448f7f209b689c1f497a23e8704096ee3f0066e57014d9237a0b134cd96c19\" returns successfully" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.025 [INFO][4632] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.026 [INFO][4632] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" iface="eth0" netns="/var/run/netns/cni-3dd1c827-ffa6-d3ab-df18-54148ec41672" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.026 [INFO][4632] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" iface="eth0" netns="/var/run/netns/cni-3dd1c827-ffa6-d3ab-df18-54148ec41672" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.026 [INFO][4632] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" iface="eth0" netns="/var/run/netns/cni-3dd1c827-ffa6-d3ab-df18-54148ec41672" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.026 [INFO][4632] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.026 [INFO][4632] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.049 [INFO][4647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.049 [INFO][4647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.049 [INFO][4647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.054 [WARNING][4647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.054 [INFO][4647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.058 [INFO][4647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:15.062787 env[1267]: 2024-12-13 14:38:15.059 [INFO][4632] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:38:15.063283 env[1267]: time="2024-12-13T14:38:15.063256064Z" level=info msg="TearDown network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" successfully" Dec 13 14:38:15.063341 env[1267]: time="2024-12-13T14:38:15.063330140Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" returns successfully" Dec 13 14:38:15.065119 env[1267]: time="2024-12-13T14:38:15.065104661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vlrm8,Uid:fa1676bd-7424-4d30-adcd-2b0d84fbc6c6,Namespace:kube-system,Attempt:1,}" Dec 13 14:38:15.183768 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:38:15.183848 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali709b553fe6a: link becomes ready Dec 13 14:38:15.182869 systemd-networkd[1063]: cali709b553fe6a: Link UP Dec 13 14:38:15.182996 systemd-networkd[1063]: cali709b553fe6a: Gained carrier Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.098 [INFO][4657] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0 coredns-6f6b679f8f- kube-system fa1676bd-7424-4d30-adcd-2b0d84fbc6c6 902 0 2024-12-13 14:36:58 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-vlrm8 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali709b553fe6a [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.098 [INFO][4657] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.130 [INFO][4668] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" HandleID="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.138 [INFO][4668] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" HandleID="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033ec80), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-vlrm8", "timestamp":"2024-12-13 14:38:15.129999166 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.138 [INFO][4668] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.138 [INFO][4668] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.138 [INFO][4668] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.140 [INFO][4668] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.146 [INFO][4668] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.149 [INFO][4668] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.150 [INFO][4668] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.153 [INFO][4668] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.153 [INFO][4668] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.155 [INFO][4668] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.165 [INFO][4668] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.173 [INFO][4668] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.173 [INFO][4668] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" host="localhost" Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.173 [INFO][4668] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:15.205814 env[1267]: 2024-12-13 14:38:15.173 [INFO][4668] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" HandleID="k8s-pod-network.49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.176 [INFO][4657] cni-plugin/k8s.go 386: Populated endpoint ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-vlrm8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali709b553fe6a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.176 [INFO][4657] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.176 [INFO][4657] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali709b553fe6a ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.190 [INFO][4657] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.190 [INFO][4657] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6", ResourceVersion:"902", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb", Pod:"coredns-6f6b679f8f-vlrm8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali709b553fe6a", MAC:"26:e2:85:74:df:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:15.208155 env[1267]: 2024-12-13 14:38:15.202 [INFO][4657] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb" Namespace="kube-system" Pod="coredns-6f6b679f8f-vlrm8" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:38:15.208399 kubelet[2106]: I1213 14:38:15.208279 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-85f8cf69df-pjb27" podStartSLOduration=67.657820128 podStartE2EDuration="1m10.203010753s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:38:12.360375702 +0000 UTC m=+77.604902798" lastFinishedPulling="2024-12-13 14:38:14.905566322 +0000 UTC m=+80.150093423" observedRunningTime="2024-12-13 14:38:15.187944917 +0000 UTC m=+80.432472026" watchObservedRunningTime="2024-12-13 14:38:15.203010753 +0000 UTC m=+80.447537858" Dec 13 14:38:15.220785 env[1267]: time="2024-12-13T14:38:15.220057585Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:15.220785 env[1267]: time="2024-12-13T14:38:15.220085405Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:15.220785 env[1267]: time="2024-12-13T14:38:15.220092612Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:15.220785 env[1267]: time="2024-12-13T14:38:15.220187246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb pid=4693 runtime=io.containerd.runc.v2 Dec 13 14:38:15.234990 systemd[1]: Started cri-containerd-49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb.scope. Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit: BPF prog-id=193 op=LOAD Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4693 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643333326230666639373839356335333461323363623932356463 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4693 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643333326230666639373839356335333461323363623932356463 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit: BPF prog-id=194 op=LOAD Dec 13 14:38:15.253000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b6020 items=0 ppid=4693 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643333326230666639373839356335333461323363623932356463 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit: BPF prog-id=195 op=LOAD Dec 13 14:38:15.253000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b6068 items=0 ppid=4693 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643333326230666639373839356335333461323363623932356463 Dec 13 14:38:15.253000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:38:15.253000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { perfmon } for pid=4702 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit[4702]: AVC avc: denied { bpf } for pid=4702 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.253000 audit: BPF prog-id=196 op=LOAD Dec 13 14:38:15.253000 audit[4702]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b6478 items=0 ppid=4693 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.253000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643333326230666639373839356335333461323363623932356463 Dec 13 14:38:15.256279 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:15.266000 audit[4721]: NETFILTER_CFG table=filter:102 family=2 entries=42 op=nft_register_chain pid=4721 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:15.266000 audit[4721]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffc7f920b30 a2=0 a3=7ffc7f920b1c items=0 ppid=4223 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.266000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:15.287982 kubelet[2106]: E1213 14:38:15.287953 2106 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-podfa1676bd_7424_4d30_adcd_2b0d84fbc6c6.slice/cri-containerd-49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb.scope\": RecentStats: unable to find data in memory cache]" Dec 13 14:38:15.303385 env[1267]: time="2024-12-13T14:38:15.303354993Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-vlrm8,Uid:fa1676bd-7424-4d30-adcd-2b0d84fbc6c6,Namespace:kube-system,Attempt:1,} returns sandbox id \"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb\"" Dec 13 14:38:15.310001 env[1267]: time="2024-12-13T14:38:15.309961510Z" level=info msg="CreateContainer within sandbox \"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:38:15.330329 env[1267]: time="2024-12-13T14:38:15.330299178Z" level=info msg="CreateContainer within sandbox \"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a8c281823f4959124445b6a2ad924d703040ee064d7774d9e8ff7c709a51b5b8\"" Dec 13 14:38:15.330820 env[1267]: time="2024-12-13T14:38:15.330800172Z" level=info msg="StartContainer for \"a8c281823f4959124445b6a2ad924d703040ee064d7774d9e8ff7c709a51b5b8\"" Dec 13 14:38:15.332000 audit[4731]: NETFILTER_CFG table=filter:103 family=2 entries=16 op=nft_register_rule pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:15.332000 audit[4731]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffef8e9ea20 a2=0 a3=7ffef8e9ea0c items=0 ppid=2262 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:15.338000 audit[4731]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=4731 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:15.338000 audit[4731]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffef8e9ea20 a2=0 a3=0 items=0 ppid=2262 pid=4731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:15.341325 systemd[1]: Started cri-containerd-a8c281823f4959124445b6a2ad924d703040ee064d7774d9e8ff7c709a51b5b8.scope. Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit: BPF prog-id=197 op=LOAD Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4693 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633238313832336634393539313234343435623661326164393234 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4693 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633238313832336634393539313234343435623661326164393234 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.353000 audit: BPF prog-id=198 op=LOAD Dec 13 14:38:15.353000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00031ef30 items=0 ppid=4693 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.353000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633238313832336634393539313234343435623661326164393234 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit: BPF prog-id=199 op=LOAD Dec 13 14:38:15.354000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00031ef78 items=0 ppid=4693 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633238313832336634393539313234343435623661326164393234 Dec 13 14:38:15.354000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:38:15.354000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:15.354000 audit: BPF prog-id=200 op=LOAD Dec 13 14:38:15.354000 audit[4739]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00031f388 items=0 ppid=4693 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.354000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633238313832336634393539313234343435623661326164393234 Dec 13 14:38:15.366309 env[1267]: time="2024-12-13T14:38:15.366242779Z" level=info msg="StartContainer for \"a8c281823f4959124445b6a2ad924d703040ee064d7774d9e8ff7c709a51b5b8\" returns successfully" Dec 13 14:38:15.371000 audit[4762]: NETFILTER_CFG table=filter:105 family=2 entries=16 op=nft_register_rule pid=4762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:15.371000 audit[4762]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffff5827220 a2=0 a3=7ffff582720c items=0 ppid=2262 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.371000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:15.376000 audit[4762]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=4762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:15.376000 audit[4762]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffff5827220 a2=0 a3=0 items=0 ppid=2262 pid=4762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:15.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:15.472659 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3706558198.mount: Deactivated successfully. Dec 13 14:38:15.472848 systemd[1]: run-netns-cni\x2d3dd1c827\x2dffa6\x2dd3ab\x2ddf18\x2d54148ec41672.mount: Deactivated successfully. Dec 13 14:38:15.582000 audit[4572]: AVC avc: denied { watch } for pid=4572 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_17.2098886771/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c101 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c61,c101 tclass=file permissive=0 Dec 13 14:38:15.582000 audit[4572]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001261c00 a2=fc6 a3=0 items=0 ppid=4179 pid=4572 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c101 key=(null) Dec 13 14:38:15.582000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:15.849000 audit[4613]: AVC avc: denied { watch } for pid=4613 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_17.2660114332/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c276,c971 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c276,c971 tclass=file permissive=0 Dec 13 14:38:15.849000 audit[4613]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016197a0 a2=fc6 a3=0 items=0 ppid=4489 pid=4613 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c276,c971 key=(null) Dec 13 14:38:15.849000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:38:15.991556 kubelet[2106]: I1213 14:38:15.991504 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-85f8cf69df-6ztsn" podStartSLOduration=67.958076176 podStartE2EDuration="1m10.991483421s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:38:11.4260359 +0000 UTC m=+76.670562996" lastFinishedPulling="2024-12-13 14:38:14.459443141 +0000 UTC m=+79.703970241" observedRunningTime="2024-12-13 14:38:15.214239447 +0000 UTC m=+80.458766551" watchObservedRunningTime="2024-12-13 14:38:15.991483421 +0000 UTC m=+81.236010528" Dec 13 14:38:16.291891 systemd-networkd[1063]: cali709b553fe6a: Gained IPv6LL Dec 13 14:38:16.386000 audit[4771]: NETFILTER_CFG table=filter:107 family=2 entries=15 op=nft_register_rule pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:16.386000 audit[4771]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffe127fa6b0 a2=0 a3=7ffe127fa69c items=0 ppid=2262 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:16.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:16.668000 audit[4771]: NETFILTER_CFG table=nat:108 family=2 entries=25 op=nft_register_chain pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:16.669969 kernel: kauditd_printk_skb: 817 callbacks suppressed Dec 13 14:38:16.671874 kernel: audit: type=1325 audit(1734100696.668:1298): table=nat:108 family=2 entries=25 op=nft_register_chain pid=4771 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:16.675614 kernel: audit: type=1300 audit(1734100696.668:1298): arch=c000003e syscall=46 success=yes exit=8932 a0=3 a1=7ffe127fa6b0 a2=0 a3=7ffe127fa69c items=0 ppid=2262 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:16.675663 kernel: audit: type=1327 audit(1734100696.668:1298): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:16.668000 audit[4771]: SYSCALL arch=c000003e syscall=46 success=yes exit=8932 a0=3 a1=7ffe127fa6b0 a2=0 a3=7ffe127fa69c items=0 ppid=2262 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:16.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:17.194678 kubelet[2106]: I1213 14:38:17.194643 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-vlrm8" podStartSLOduration=79.182831002 podStartE2EDuration="1m19.182831002s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:38:16.239638634 +0000 UTC m=+81.484165736" watchObservedRunningTime="2024-12-13 14:38:17.182831002 +0000 UTC m=+82.427358113" Dec 13 14:38:17.685000 audit[4780]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:17.700273 kernel: audit: type=1325 audit(1734100697.685:1299): table=filter:109 family=2 entries=11 op=nft_register_rule pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:17.704227 kernel: audit: type=1300 audit(1734100697.685:1299): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffda8ff27e0 a2=0 a3=7ffda8ff27cc items=0 ppid=2262 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:17.704251 kernel: audit: type=1327 audit(1734100697.685:1299): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:17.708218 kernel: audit: type=1325 audit(1734100697.692:1300): table=nat:110 family=2 entries=37 op=nft_register_chain pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:17.708248 kernel: audit: type=1300 audit(1734100697.692:1300): arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffda8ff27e0 a2=0 a3=7ffda8ff27cc items=0 ppid=2262 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:17.708271 kernel: audit: type=1327 audit(1734100697.692:1300): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:17.685000 audit[4780]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffda8ff27e0 a2=0 a3=7ffda8ff27cc items=0 ppid=2262 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:17.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:17.692000 audit[4780]: NETFILTER_CFG table=nat:110 family=2 entries=37 op=nft_register_chain pid=4780 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:17.692000 audit[4780]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffda8ff27e0 a2=0 a3=7ffda8ff27cc items=0 ppid=2262 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:17.692000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:19.967106 env[1267]: time="2024-12-13T14:38:19.967067727Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.033 [INFO][4795] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.033 [INFO][4795] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" iface="eth0" netns="/var/run/netns/cni-9154b467-8621-7b8a-a850-df45ef61f683" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.034 [INFO][4795] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" iface="eth0" netns="/var/run/netns/cni-9154b467-8621-7b8a-a850-df45ef61f683" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.035 [INFO][4795] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" iface="eth0" netns="/var/run/netns/cni-9154b467-8621-7b8a-a850-df45ef61f683" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.035 [INFO][4795] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.035 [INFO][4795] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.071 [INFO][4802] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.071 [INFO][4802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.071 [INFO][4802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.075 [WARNING][4802] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.075 [INFO][4802] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.076 [INFO][4802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:20.079802 env[1267]: 2024-12-13 14:38:20.078 [INFO][4795] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:38:20.080972 env[1267]: time="2024-12-13T14:38:20.080602643Z" level=info msg="TearDown network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" successfully" Dec 13 14:38:20.080972 env[1267]: time="2024-12-13T14:38:20.080623070Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" returns successfully" Dec 13 14:38:20.083259 systemd[1]: run-netns-cni\x2d9154b467\x2d8621\x2d7b8a\x2da850\x2ddf45ef61f683.mount: Deactivated successfully. Dec 13 14:38:20.085299 env[1267]: time="2024-12-13T14:38:20.085270199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b8b7d84bb-qdzc8,Uid:c6d1116b-f94f-4e6c-a472-6990e3046598,Namespace:calico-system,Attempt:1,}" Dec 13 14:38:20.192718 systemd-networkd[1063]: cali98c9f229aa4: Link UP Dec 13 14:38:20.196308 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:38:20.196689 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali98c9f229aa4: link becomes ready Dec 13 14:38:20.196471 systemd-networkd[1063]: cali98c9f229aa4: Gained carrier Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.126 [INFO][4808] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0 calico-kube-controllers-5b8b7d84bb- calico-system c6d1116b-f94f-4e6c-a472-6990e3046598 952 0 2024-12-13 14:37:05 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5b8b7d84bb projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5b8b7d84bb-qdzc8 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali98c9f229aa4 [] []}} ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.126 [INFO][4808] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.156 [INFO][4821] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" HandleID="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.166 [INFO][4821] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" HandleID="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5b8b7d84bb-qdzc8", "timestamp":"2024-12-13 14:38:20.156708859 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.166 [INFO][4821] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.166 [INFO][4821] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.166 [INFO][4821] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.167 [INFO][4821] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.176 [INFO][4821] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.179 [INFO][4821] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.180 [INFO][4821] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.181 [INFO][4821] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.181 [INFO][4821] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.181 [INFO][4821] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184 Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.183 [INFO][4821] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.187 [INFO][4821] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.187 [INFO][4821] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" host="localhost" Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.187 [INFO][4821] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:20.204272 env[1267]: 2024-12-13 14:38:20.187 [INFO][4821] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" HandleID="k8s-pod-network.44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.188 [INFO][4808] cni-plugin/k8s.go 386: Populated endpoint ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0", GenerateName:"calico-kube-controllers-5b8b7d84bb-", Namespace:"calico-system", SelfLink:"", UID:"c6d1116b-f94f-4e6c-a472-6990e3046598", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b8b7d84bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5b8b7d84bb-qdzc8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98c9f229aa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.189 [INFO][4808] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.189 [INFO][4808] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali98c9f229aa4 ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.193 [INFO][4808] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.193 [INFO][4808] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0", GenerateName:"calico-kube-controllers-5b8b7d84bb-", Namespace:"calico-system", SelfLink:"", UID:"c6d1116b-f94f-4e6c-a472-6990e3046598", ResourceVersion:"952", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b8b7d84bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184", Pod:"calico-kube-controllers-5b8b7d84bb-qdzc8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98c9f229aa4", MAC:"4e:84:71:ba:11:a3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:20.206212 env[1267]: 2024-12-13 14:38:20.201 [INFO][4808] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184" Namespace="calico-system" Pod="calico-kube-controllers-5b8b7d84bb-qdzc8" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:38:20.227474 env[1267]: time="2024-12-13T14:38:20.227176799Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:20.227474 env[1267]: time="2024-12-13T14:38:20.227202848Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:20.227474 env[1267]: time="2024-12-13T14:38:20.227209887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:20.229034 env[1267]: time="2024-12-13T14:38:20.228787015Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184 pid=4848 runtime=io.containerd.runc.v2 Dec 13 14:38:20.237000 audit[4860]: NETFILTER_CFG table=filter:111 family=2 entries=46 op=nft_register_chain pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:20.237000 audit[4860]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffee0e94d40 a2=0 a3=7ffee0e94d2c items=0 ppid=4223 pid=4860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:20.240877 kernel: audit: type=1325 audit(1734100700.237:1301): table=filter:111 family=2 entries=46 op=nft_register_chain pid=4860 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:20.248398 systemd[1]: Started cri-containerd-44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184.scope. Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit: BPF prog-id=201 op=LOAD Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393334623430396539336130653631346230646232666365313762 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=c items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393334623430396539336130653631346230646232666365313762 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.265000 audit: BPF prog-id=202 op=LOAD Dec 13 14:38:20.265000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000298380 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393334623430396539336130653631346230646232666365313762 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit: BPF prog-id=203 op=LOAD Dec 13 14:38:20.266000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c0002983c8 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393334623430396539336130653631346230646232666365313762 Dec 13 14:38:20.266000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:38:20.266000 audit: BPF prog-id=202 op=UNLOAD Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { perfmon } for pid=4859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit[4859]: AVC avc: denied { bpf } for pid=4859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:20.266000 audit: BPF prog-id=204 op=LOAD Dec 13 14:38:20.266000 audit[4859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c0002987d8 items=0 ppid=4848 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:20.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434393334623430396539336130653631346230646232666365313762 Dec 13 14:38:20.268958 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:20.303891 env[1267]: time="2024-12-13T14:38:20.303811837Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b8b7d84bb-qdzc8,Uid:c6d1116b-f94f-4e6c-a472-6990e3046598,Namespace:calico-system,Attempt:1,} returns sandbox id \"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184\"" Dec 13 14:38:20.319123 env[1267]: time="2024-12-13T14:38:20.318842143Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:38:20.946053 env[1267]: time="2024-12-13T14:38:20.946029973Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:38:20.946231 env[1267]: time="2024-12-13T14:38:20.946132993Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.995 [INFO][4913] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.996 [INFO][4913] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" iface="eth0" netns="/var/run/netns/cni-220e8397-4920-e6f2-a6c7-667a9e7f0395" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.996 [INFO][4913] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" iface="eth0" netns="/var/run/netns/cni-220e8397-4920-e6f2-a6c7-667a9e7f0395" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.996 [INFO][4913] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" iface="eth0" netns="/var/run/netns/cni-220e8397-4920-e6f2-a6c7-667a9e7f0395" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.996 [INFO][4913] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:20.996 [INFO][4913] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.033 [INFO][4924] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.034 [INFO][4924] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.035 [INFO][4924] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.039 [WARNING][4924] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.039 [INFO][4924] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.041 [INFO][4924] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:21.046960 env[1267]: 2024-12-13 14:38:21.043 [INFO][4913] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:38:21.049265 env[1267]: time="2024-12-13T14:38:21.047230196Z" level=info msg="TearDown network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" successfully" Dec 13 14:38:21.049265 env[1267]: time="2024-12-13T14:38:21.047267073Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" returns successfully" Dec 13 14:38:21.049265 env[1267]: time="2024-12-13T14:38:21.047694149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-v5ctd,Uid:61699123-ed1d-4a68-b972-8f873921908d,Namespace:kube-system,Attempt:1,}" Dec 13 14:38:21.083367 systemd[1]: run-netns-cni\x2d220e8397\x2d4920\x2de6f2\x2da6c7\x2d667a9e7f0395.mount: Deactivated successfully. Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.024 [INFO][4914] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.024 [INFO][4914] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" iface="eth0" netns="/var/run/netns/cni-ad805a99-365d-fa06-10b5-15e1b685e0e4" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.024 [INFO][4914] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" iface="eth0" netns="/var/run/netns/cni-ad805a99-365d-fa06-10b5-15e1b685e0e4" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.025 [INFO][4914] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" iface="eth0" netns="/var/run/netns/cni-ad805a99-365d-fa06-10b5-15e1b685e0e4" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.025 [INFO][4914] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.025 [INFO][4914] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.056 [INFO][4930] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.056 [INFO][4930] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.056 [INFO][4930] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.071 [WARNING][4930] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.071 [INFO][4930] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.072 [INFO][4930] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:21.089142 env[1267]: 2024-12-13 14:38:21.087 [INFO][4914] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:38:21.092994 systemd[1]: run-netns-cni\x2dad805a99\x2d365d\x2dfa06\x2d10b5\x2d15e1b685e0e4.mount: Deactivated successfully. Dec 13 14:38:21.097264 env[1267]: time="2024-12-13T14:38:21.093857013Z" level=info msg="TearDown network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" successfully" Dec 13 14:38:21.097264 env[1267]: time="2024-12-13T14:38:21.093888769Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" returns successfully" Dec 13 14:38:21.097264 env[1267]: time="2024-12-13T14:38:21.094258046Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rskds,Uid:137b900f-a1c0-406e-87c9-33eedf71f128,Namespace:calico-system,Attempt:1,}" Dec 13 14:38:21.205610 systemd-networkd[1063]: calif86d25b23ea: Link UP Dec 13 14:38:21.206185 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:38:21.206248 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif86d25b23ea: link becomes ready Dec 13 14:38:21.206338 systemd-networkd[1063]: calif86d25b23ea: Gained carrier Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.105 [INFO][4935] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0 coredns-6f6b679f8f- kube-system 61699123-ed1d-4a68-b972-8f873921908d 960 0 2024-12-13 14:36:58 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-v5ctd eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calif86d25b23ea [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.105 [INFO][4935] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.154 [INFO][4950] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" HandleID="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.169 [INFO][4950] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" HandleID="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003187b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-v5ctd", "timestamp":"2024-12-13 14:38:21.153988892 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.170 [INFO][4950] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.170 [INFO][4950] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.170 [INFO][4950] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.171 [INFO][4950] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.173 [INFO][4950] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.177 [INFO][4950] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.178 [INFO][4950] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.179 [INFO][4950] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.179 [INFO][4950] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.180 [INFO][4950] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2 Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.193 [INFO][4950] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.199 [INFO][4950] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.199 [INFO][4950] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" host="localhost" Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.199 [INFO][4950] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:21.228824 env[1267]: 2024-12-13 14:38:21.199 [INFO][4950] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" HandleID="k8s-pod-network.286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.201 [INFO][4935] cni-plugin/k8s.go 386: Populated endpoint ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"61699123-ed1d-4a68-b972-8f873921908d", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-v5ctd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif86d25b23ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.201 [INFO][4935] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.201 [INFO][4935] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif86d25b23ea ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.207 [INFO][4935] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.208 [INFO][4935] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"61699123-ed1d-4a68-b972-8f873921908d", ResourceVersion:"960", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2", Pod:"coredns-6f6b679f8f-v5ctd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif86d25b23ea", MAC:"d2:93:5d:7e:d7:d2", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:21.234120 env[1267]: 2024-12-13 14:38:21.225 [INFO][4935] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2" Namespace="kube-system" Pod="coredns-6f6b679f8f-v5ctd" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:38:21.235000 audit[4988]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=4988 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:21.235000 audit[4988]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7ffd18e21eb0 a2=0 a3=7ffd18e21e9c items=0 ppid=4223 pid=4988 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.235000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:21.250029 env[1267]: time="2024-12-13T14:38:21.249985715Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:21.250152 env[1267]: time="2024-12-13T14:38:21.250012884Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:21.250152 env[1267]: time="2024-12-13T14:38:21.250024087Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:21.250224 env[1267]: time="2024-12-13T14:38:21.250174410Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2 pid=4996 runtime=io.containerd.runc.v2 Dec 13 14:38:21.278289 systemd[1]: Started cri-containerd-286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2.scope. Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.294000 audit: BPF prog-id=205 op=LOAD Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4996 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366439376436346337633061366563363466343861373638326562 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4996 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366439376436346337633061366563363466343861373638326562 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.317786 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali352cc01dcc4: link becomes ready Dec 13 14:38:21.295000 audit: BPF prog-id=206 op=LOAD Dec 13 14:38:21.295000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003813c0 items=0 ppid=4996 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366439376436346337633061366563363466343861373638326562 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.295000 audit: BPF prog-id=207 op=LOAD Dec 13 14:38:21.295000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381408 items=0 ppid=4996 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366439376436346337633061366563363466343861373638326562 Dec 13 14:38:21.295000 audit: BPF prog-id=207 op=UNLOAD Dec 13 14:38:21.296000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { perfmon } for pid=5005 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit[5005]: AVC avc: denied { bpf } for pid=5005 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.296000 audit: BPF prog-id=208 op=LOAD Dec 13 14:38:21.296000 audit[5005]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000381818 items=0 ppid=4996 pid=5005 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238366439376436346337633061366563363466343861373638326562 Dec 13 14:38:21.297389 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:21.319258 systemd-networkd[1063]: cali352cc01dcc4: Link UP Dec 13 14:38:21.319376 systemd-networkd[1063]: cali352cc01dcc4: Gained carrier Dec 13 14:38:21.329909 env[1267]: time="2024-12-13T14:38:21.329879798Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-v5ctd,Uid:61699123-ed1d-4a68-b972-8f873921908d,Namespace:kube-system,Attempt:1,} returns sandbox id \"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2\"" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.151 [INFO][4954] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--rskds-eth0 csi-node-driver- calico-system 137b900f-a1c0-406e-87c9-33eedf71f128 961 0 2024-12-13 14:37:05 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-rskds eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali352cc01dcc4 [] []}} ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.151 [INFO][4954] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.203 [INFO][4967] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" HandleID="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.268 [INFO][4967] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" HandleID="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Workload="localhost-k8s-csi--node--driver--rskds-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011b620), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-rskds", "timestamp":"2024-12-13 14:38:21.203855801 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.268 [INFO][4967] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.268 [INFO][4967] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.268 [INFO][4967] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.271 [INFO][4967] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.275 [INFO][4967] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.282 [INFO][4967] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.284 [INFO][4967] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.291 [INFO][4967] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.291 [INFO][4967] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.294 [INFO][4967] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.300 [INFO][4967] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.314 [INFO][4967] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.314 [INFO][4967] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" host="localhost" Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.314 [INFO][4967] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:38:21.339082 env[1267]: 2024-12-13 14:38:21.314 [INFO][4967] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" HandleID="k8s-pod-network.d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.315 [INFO][4954] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rskds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"137b900f-a1c0-406e-87c9-33eedf71f128", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-rskds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali352cc01dcc4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.315 [INFO][4954] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.315 [INFO][4954] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali352cc01dcc4 ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.317 [INFO][4954] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.317 [INFO][4954] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rskds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"137b900f-a1c0-406e-87c9-33eedf71f128", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee", Pod:"csi-node-driver-rskds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali352cc01dcc4", MAC:"0a:59:25:29:4a:a2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:38:21.350491 env[1267]: 2024-12-13 14:38:21.337 [INFO][4954] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee" Namespace="calico-system" Pod="csi-node-driver-rskds" WorkloadEndpoint="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:38:21.363000 audit[5043]: NETFILTER_CFG table=filter:113 family=2 entries=50 op=nft_register_chain pid=5043 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:38:21.363000 audit[5043]: SYSCALL arch=c000003e syscall=46 success=yes exit=23392 a0=3 a1=7ffcccbe3cc0 a2=0 a3=7ffcccbe3cac items=0 ppid=4223 pid=5043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.363000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:38:21.383839 env[1267]: time="2024-12-13T14:38:21.383794428Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:38:21.383839 env[1267]: time="2024-12-13T14:38:21.383820514Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:38:21.383990 env[1267]: time="2024-12-13T14:38:21.383969914Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:38:21.384577 env[1267]: time="2024-12-13T14:38:21.384119739Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee pid=5052 runtime=io.containerd.runc.v2 Dec 13 14:38:21.391631 systemd[1]: Started cri-containerd-d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee.scope. Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.400000 audit: BPF prog-id=209 op=LOAD Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5052 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643535363232353764326630393461326132626431663337663737 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5052 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643535363232353764326630393461326132626431663337663737 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit: BPF prog-id=210 op=LOAD Dec 13 14:38:21.401000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a0520 items=0 ppid=5052 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643535363232353764326630393461326132626431663337663737 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit: BPF prog-id=211 op=LOAD Dec 13 14:38:21.401000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a0568 items=0 ppid=5052 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643535363232353764326630393461326132626431663337663737 Dec 13 14:38:21.401000 audit: BPF prog-id=211 op=UNLOAD Dec 13 14:38:21.401000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { perfmon } for pid=5062 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit[5062]: AVC avc: denied { bpf } for pid=5062 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.401000 audit: BPF prog-id=212 op=LOAD Dec 13 14:38:21.401000 audit[5062]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a0978 items=0 ppid=5052 pid=5062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435643535363232353764326630393461326132626431663337663737 Dec 13 14:38:21.403743 systemd-resolved[1206]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Dec 13 14:38:21.449226 env[1267]: time="2024-12-13T14:38:21.410874962Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rskds,Uid:137b900f-a1c0-406e-87c9-33eedf71f128,Namespace:calico-system,Attempt:1,} returns sandbox id \"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee\"" Dec 13 14:38:21.603873 systemd-networkd[1063]: cali98c9f229aa4: Gained IPv6LL Dec 13 14:38:21.629994 env[1267]: time="2024-12-13T14:38:21.629968074Z" level=info msg="CreateContainer within sandbox \"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:38:21.693839 env[1267]: time="2024-12-13T14:38:21.693810117Z" level=info msg="CreateContainer within sandbox \"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bb3fa35f0058d059b074f694144152a6c4d12c383d5be707f8d25c3a7a445a3d\"" Dec 13 14:38:21.694382 env[1267]: time="2024-12-13T14:38:21.694366874Z" level=info msg="StartContainer for \"bb3fa35f0058d059b074f694144152a6c4d12c383d5be707f8d25c3a7a445a3d\"" Dec 13 14:38:21.706725 systemd[1]: Started cri-containerd-bb3fa35f0058d059b074f694144152a6c4d12c383d5be707f8d25c3a7a445a3d.scope. Dec 13 14:38:21.726587 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 14:38:21.726669 kernel: audit: type=1400 audit(1734100701.717:1358): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726694 kernel: audit: type=1400 audit(1734100701.717:1359): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726710 kernel: audit: type=1400 audit(1734100701.717:1360): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.732884 kernel: audit: type=1400 audit(1734100701.717:1361): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.732925 kernel: audit: type=1400 audit(1734100701.717:1362): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.735445 kernel: audit: type=1400 audit(1734100701.717:1363): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.737965 kernel: audit: type=1400 audit(1734100701.717:1364): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.741023 kernel: audit: type=1400 audit(1734100701.717:1365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.751478 kernel: audit: type=1400 audit(1734100701.717:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.751530 kernel: audit: type=1400 audit(1734100701.717:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.717000 audit: BPF prog-id=213 op=LOAD Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4996 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336661333566303035386430353962303734663639343134343135 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4996 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336661333566303035386430353962303734663639343134343135 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.721000 audit: BPF prog-id=214 op=LOAD Dec 13 14:38:21.721000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000245e10 items=0 ppid=4996 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336661333566303035386430353962303734663639343134343135 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.723000 audit: BPF prog-id=215 op=LOAD Dec 13 14:38:21.723000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000245e58 items=0 ppid=4996 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336661333566303035386430353962303734663639343134343135 Dec 13 14:38:21.726000 audit: BPF prog-id=215 op=UNLOAD Dec 13 14:38:21.726000 audit: BPF prog-id=214 op=UNLOAD Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { perfmon } for pid=5093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit[5093]: AVC avc: denied { bpf } for pid=5093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:21.726000 audit: BPF prog-id=216 op=LOAD Dec 13 14:38:21.726000 audit[5093]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000308268 items=0 ppid=4996 pid=5093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:21.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262336661333566303035386430353962303734663639343134343135 Dec 13 14:38:21.791273 env[1267]: time="2024-12-13T14:38:21.757533567Z" level=info msg="StartContainer for \"bb3fa35f0058d059b074f694144152a6c4d12c383d5be707f8d25c3a7a445a3d\" returns successfully" Dec 13 14:38:22.563879 systemd-networkd[1063]: calif86d25b23ea: Gained IPv6LL Dec 13 14:38:22.675525 kubelet[2106]: I1213 14:38:22.665324 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-v5ctd" podStartSLOduration=84.514235943 podStartE2EDuration="1m24.514235943s" podCreationTimestamp="2024-12-13 14:36:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:38:22.499224011 +0000 UTC m=+87.743751123" watchObservedRunningTime="2024-12-13 14:38:22.514235943 +0000 UTC m=+87.758763047" Dec 13 14:38:22.680000 audit[5132]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=5132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:22.680000 audit[5132]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc3160bca0 a2=0 a3=7ffc3160bc8c items=0 ppid=2262 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:22.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:22.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.110:22-147.75.109.163:52588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:22.685000 audit[5132]: NETFILTER_CFG table=nat:115 family=2 entries=46 op=nft_register_rule pid=5132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:22.685000 audit[5132]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffc3160bca0 a2=0 a3=7ffc3160bc8c items=0 ppid=2262 pid=5132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:22.685000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:22.683122 systemd[1]: Started sshd@7-139.178.70.110:22-147.75.109.163:52588.service. Dec 13 14:38:23.075878 systemd-networkd[1063]: cali352cc01dcc4: Gained IPv6LL Dec 13 14:38:23.218000 audit[5135]: USER_ACCT pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:23.219000 audit[5135]: CRED_ACQ pid=5135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:23.219000 audit[5135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc31f10350 a2=3 a3=0 items=0 ppid=1 pid=5135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:23.219000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:23.278844 sshd[5135]: Accepted publickey for core from 147.75.109.163 port 52588 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:23.252716 sshd[5135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:23.315818 systemd-logind[1243]: New session 10 of user core. Dec 13 14:38:23.316340 systemd[1]: Started session-10.scope. Dec 13 14:38:23.318000 audit[5135]: USER_START pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:23.319000 audit[5137]: CRED_ACQ pid=5137 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:23.609000 audit[5145]: NETFILTER_CFG table=filter:116 family=2 entries=8 op=nft_register_rule pid=5145 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:23.609000 audit[5145]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffccffb890 a2=0 a3=7fffccffb87c items=0 ppid=2262 pid=5145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:23.609000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:23.614000 audit[5145]: NETFILTER_CFG table=nat:117 family=2 entries=58 op=nft_register_chain pid=5145 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:23.614000 audit[5145]: SYSCALL arch=c000003e syscall=46 success=yes exit=20628 a0=3 a1=7fffccffb890 a2=0 a3=7fffccffb87c items=0 ppid=2262 pid=5145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:23.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:24.315068 env[1267]: time="2024-12-13T14:38:24.315043143Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:24.317263 env[1267]: time="2024-12-13T14:38:24.317249090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:24.319266 env[1267]: time="2024-12-13T14:38:24.319253428Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:24.323017 env[1267]: time="2024-12-13T14:38:24.322997944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:24.323240 env[1267]: time="2024-12-13T14:38:24.323224923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 14:38:24.702051 env[1267]: time="2024-12-13T14:38:24.701617926Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:38:24.821157 env[1267]: time="2024-12-13T14:38:24.821057852Z" level=info msg="CreateContainer within sandbox \"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:38:24.836719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount462725222.mount: Deactivated successfully. Dec 13 14:38:24.841688 env[1267]: time="2024-12-13T14:38:24.841607102Z" level=info msg="CreateContainer within sandbox \"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"dc0b062a1ddf6aabcdc86b7637e46816f22ada52222d45d13a419e936d34ab8e\"" Dec 13 14:38:24.845602 env[1267]: time="2024-12-13T14:38:24.845547473Z" level=info msg="StartContainer for \"dc0b062a1ddf6aabcdc86b7637e46816f22ada52222d45d13a419e936d34ab8e\"" Dec 13 14:38:24.865506 systemd[1]: Started cri-containerd-dc0b062a1ddf6aabcdc86b7637e46816f22ada52222d45d13a419e936d34ab8e.scope. Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.884000 audit: BPF prog-id=217 op=LOAD Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4848 pid=5159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306230363261316464663661616263646338366237363337653436 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4848 pid=5159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306230363261316464663661616263646338366237363337653436 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit: BPF prog-id=218 op=LOAD Dec 13 14:38:24.885000 audit[5159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c27c0 items=0 ppid=4848 pid=5159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306230363261316464663661616263646338366237363337653436 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit: BPF prog-id=219 op=LOAD Dec 13 14:38:24.885000 audit[5159]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2808 items=0 ppid=4848 pid=5159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306230363261316464663661616263646338366237363337653436 Dec 13 14:38:24.885000 audit: BPF prog-id=219 op=UNLOAD Dec 13 14:38:24.885000 audit: BPF prog-id=218 op=UNLOAD Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { perfmon } for pid=5159 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit[5159]: AVC avc: denied { bpf } for pid=5159 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:24.885000 audit: BPF prog-id=220 op=LOAD Dec 13 14:38:24.885000 audit[5159]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2c18 items=0 ppid=4848 pid=5159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:24.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463306230363261316464663661616263646338366237363337653436 Dec 13 14:38:24.948313 env[1267]: time="2024-12-13T14:38:24.918316467Z" level=info msg="StartContainer for \"dc0b062a1ddf6aabcdc86b7637e46816f22ada52222d45d13a419e936d34ab8e\" returns successfully" Dec 13 14:38:26.179014 kubelet[2106]: I1213 14:38:26.176533 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5b8b7d84bb-qdzc8" podStartSLOduration=76.752022851 podStartE2EDuration="1m21.133430623s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:38:20.31108087 +0000 UTC m=+85.555607967" lastFinishedPulling="2024-12-13 14:38:24.692488638 +0000 UTC m=+89.937015739" observedRunningTime="2024-12-13 14:38:26.127656912 +0000 UTC m=+91.372184020" watchObservedRunningTime="2024-12-13 14:38:26.133430623 +0000 UTC m=+91.377957731" Dec 13 14:38:26.677638 env[1267]: time="2024-12-13T14:38:26.676328509Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:26.707706 env[1267]: time="2024-12-13T14:38:26.707663729Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:26.778366 env[1267]: time="2024-12-13T14:38:26.772365036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:26.832466 env[1267]: time="2024-12-13T14:38:26.832433154Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:26.848871 env[1267]: time="2024-12-13T14:38:26.832957473Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 14:38:26.848871 env[1267]: time="2024-12-13T14:38:26.842411832Z" level=info msg="CreateContainer within sandbox \"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:38:26.931085 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount839981445.mount: Deactivated successfully. Dec 13 14:38:26.935052 env[1267]: time="2024-12-13T14:38:26.935019408Z" level=info msg="CreateContainer within sandbox \"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a96cb242b1a28150ccfa5421b59e4f7fc96bbbb8b074e2eb73bea157aafdee78\"" Dec 13 14:38:26.935856 env[1267]: time="2024-12-13T14:38:26.935619942Z" level=info msg="StartContainer for \"a96cb242b1a28150ccfa5421b59e4f7fc96bbbb8b074e2eb73bea157aafdee78\"" Dec 13 14:38:26.957676 sshd[5135]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:26.987501 kernel: kauditd_printk_skb: 124 callbacks suppressed Dec 13 14:38:27.019281 kernel: audit: type=1106 audit(1734100706.962:1404): pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:27.042332 kernel: audit: type=1104 audit(1734100706.962:1405): pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:27.042402 kernel: audit: type=1131 audit(1734100707.027:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.110:22-147.75.109.163:52588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:26.962000 audit[5135]: USER_END pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:26.962000 audit[5135]: CRED_DISP pid=5135 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:27.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-139.178.70.110:22-147.75.109.163:52588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:27.024320 systemd[1]: sshd@7-139.178.70.110:22-147.75.109.163:52588.service: Deactivated successfully. Dec 13 14:38:27.028658 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:38:27.032269 systemd-logind[1243]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:38:27.045473 systemd[1]: Started cri-containerd-a96cb242b1a28150ccfa5421b59e4f7fc96bbbb8b074e2eb73bea157aafdee78.scope. Dec 13 14:38:27.046034 systemd-logind[1243]: Removed session 10. Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f3526ec94d8 items=0 ppid=5052 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:27.082907 kernel: audit: type=1400 audit(1734100707.073:1407): avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.082961 kernel: audit: type=1300 audit(1734100707.073:1407): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f3526ec94d8 items=0 ppid=5052 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:27.082979 kernel: audit: type=1327 audit(1734100707.073:1407): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366362323432623161323831353063636661353432316235396534 Dec 13 14:38:27.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366362323432623161323831353063636661353432316235396534 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.086943 kernel: audit: type=1400 audit(1734100707.073:1408): avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.089657 kernel: audit: type=1400 audit(1734100707.073:1408): avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.098808 kernel: audit: type=1400 audit(1734100707.073:1408): avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.102781 kernel: audit: type=1400 audit(1734100707.073:1408): avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.073000 audit: BPF prog-id=221 op=LOAD Dec 13 14:38:27.073000 audit[5196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000218b48 items=0 ppid=5052 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:27.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366362323432623161323831353063636661353432316235396534 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit: BPF prog-id=222 op=LOAD Dec 13 14:38:27.083000 audit[5196]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000218b98 items=0 ppid=5052 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:27.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366362323432623161323831353063636661353432316235396534 Dec 13 14:38:27.083000 audit: BPF prog-id=222 op=UNLOAD Dec 13 14:38:27.083000 audit: BPF prog-id=221 op=UNLOAD Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { perfmon } for pid=5196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit[5196]: AVC avc: denied { bpf } for pid=5196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:27.083000 audit: BPF prog-id=223 op=LOAD Dec 13 14:38:27.083000 audit[5196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000218c28 items=0 ppid=5052 pid=5196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:27.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139366362323432623161323831353063636661353432316235396534 Dec 13 14:38:27.128913 env[1267]: time="2024-12-13T14:38:27.117441733Z" level=info msg="StartContainer for \"a96cb242b1a28150ccfa5421b59e4f7fc96bbbb8b074e2eb73bea157aafdee78\" returns successfully" Dec 13 14:38:27.131461 env[1267]: time="2024-12-13T14:38:27.131436831Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:38:27.927474 systemd[1]: run-containerd-runc-k8s.io-a96cb242b1a28150ccfa5421b59e4f7fc96bbbb8b074e2eb73bea157aafdee78-runc.NYu8RN.mount: Deactivated successfully. Dec 13 14:38:28.626388 env[1267]: time="2024-12-13T14:38:28.626345346Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:28.638351 env[1267]: time="2024-12-13T14:38:28.638315485Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:28.643548 env[1267]: time="2024-12-13T14:38:28.640633750Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:28.650057 env[1267]: time="2024-12-13T14:38:28.650014667Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:38:28.650702 env[1267]: time="2024-12-13T14:38:28.650674254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 14:38:28.652480 env[1267]: time="2024-12-13T14:38:28.652454545Z" level=info msg="CreateContainer within sandbox \"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:38:28.710979 env[1267]: time="2024-12-13T14:38:28.710946067Z" level=info msg="CreateContainer within sandbox \"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"2cda74faa8e8f8f24287126dccc9d9203cd207ea5f687bfe173d9e34afc333d3\"" Dec 13 14:38:28.711411 env[1267]: time="2024-12-13T14:38:28.711393960Z" level=info msg="StartContainer for \"2cda74faa8e8f8f24287126dccc9d9203cd207ea5f687bfe173d9e34afc333d3\"" Dec 13 14:38:28.736583 systemd[1]: Started cri-containerd-2cda74faa8e8f8f24287126dccc9d9203cd207ea5f687bfe173d9e34afc333d3.scope. Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4dd0021238 items=0 ppid=5052 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263646137346661613865386638663234323837313236646363633964 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit: BPF prog-id=224 op=LOAD Dec 13 14:38:28.754000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000fbc58 items=0 ppid=5052 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263646137346661613865386638663234323837313236646363633964 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit: BPF prog-id=225 op=LOAD Dec 13 14:38:28.754000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000fbca8 items=0 ppid=5052 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263646137346661613865386638663234323837313236646363633964 Dec 13 14:38:28.754000 audit: BPF prog-id=225 op=UNLOAD Dec 13 14:38:28.754000 audit: BPF prog-id=224 op=UNLOAD Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { perfmon } for pid=5256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit[5256]: AVC avc: denied { bpf } for pid=5256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:38:28.754000 audit: BPF prog-id=226 op=LOAD Dec 13 14:38:28.754000 audit[5256]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000fbd38 items=0 ppid=5052 pid=5256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:28.754000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263646137346661613865386638663234323837313236646363633964 Dec 13 14:38:28.828847 env[1267]: time="2024-12-13T14:38:28.780528536Z" level=info msg="StartContainer for \"2cda74faa8e8f8f24287126dccc9d9203cd207ea5f687bfe173d9e34afc333d3\" returns successfully" Dec 13 14:38:29.529780 kubelet[2106]: I1213 14:38:29.529741 2106 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:38:29.529780 kubelet[2106]: I1213 14:38:29.529782 2106 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:38:32.090348 systemd[1]: Started sshd@8-139.178.70.110:22-147.75.109.163:35392.service. Dec 13 14:38:32.114220 kernel: kauditd_printk_skb: 79 callbacks suppressed Dec 13 14:38:32.114270 kernel: audit: type=1130 audit(1734100712.089:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.110:22-147.75.109.163:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:32.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.110:22-147.75.109.163:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:32.815000 audit[5290]: USER_ACCT pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.819996 kernel: audit: type=1101 audit(1734100712.815:1420): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.820049 sshd[5290]: Accepted publickey for core from 147.75.109.163 port 35392 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:32.819000 audit[5290]: CRED_ACQ pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.825408 kernel: audit: type=1103 audit(1734100712.819:1421): pid=5290 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.825483 kernel: audit: type=1006 audit(1734100712.819:1422): pid=5290 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:38:32.825508 kernel: audit: type=1300 audit(1734100712.819:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7c4756d0 a2=3 a3=0 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:32.828874 kernel: audit: type=1327 audit(1734100712.819:1422): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:32.819000 audit[5290]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc7c4756d0 a2=3 a3=0 items=0 ppid=1 pid=5290 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:32.819000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:32.830362 sshd[5290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:32.842143 systemd-logind[1243]: New session 11 of user core. Dec 13 14:38:32.843963 systemd[1]: Started session-11.scope. Dec 13 14:38:32.846000 audit[5290]: USER_START pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.850000 audit[5298]: CRED_ACQ pid=5298 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.854305 kernel: audit: type=1105 audit(1734100712.846:1423): pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:32.854358 kernel: audit: type=1103 audit(1734100712.850:1424): pid=5298 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:33.482911 sshd[5290]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:33.482000 audit[5290]: USER_END pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:33.486000 audit[5290]: CRED_DISP pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:33.490321 kernel: audit: type=1106 audit(1734100713.482:1425): pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:33.494156 kernel: audit: type=1104 audit(1734100713.486:1426): pid=5290 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:33.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-139.178.70.110:22-147.75.109.163:35392 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:33.490923 systemd-logind[1243]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:38:33.491010 systemd[1]: sshd@8-139.178.70.110:22-147.75.109.163:35392.service: Deactivated successfully. Dec 13 14:38:33.491456 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:38:33.491917 systemd-logind[1243]: Removed session 11. Dec 13 14:38:37.009360 systemd[1]: run-containerd-runc-k8s.io-bf1331b0292803251c984c5dc3d60ff9f008085908bcbb7df884e3e4e5a6c9eb-runc.0u8PC7.mount: Deactivated successfully. Dec 13 14:38:37.957432 kubelet[2106]: I1213 14:38:37.956488 2106 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-rskds" podStartSLOduration=85.867260283 podStartE2EDuration="1m32.955471773s" podCreationTimestamp="2024-12-13 14:37:05 +0000 UTC" firstStartedPulling="2024-12-13 14:38:21.563309896 +0000 UTC m=+86.807836993" lastFinishedPulling="2024-12-13 14:38:28.651521382 +0000 UTC m=+93.896048483" observedRunningTime="2024-12-13 14:38:29.050637557 +0000 UTC m=+94.295164673" watchObservedRunningTime="2024-12-13 14:38:37.955471773 +0000 UTC m=+103.199998876" Dec 13 14:38:38.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.110:22-147.75.109.163:40430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:38.490258 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:38:38.490297 kernel: audit: type=1130 audit(1734100718.485:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.110:22-147.75.109.163:40430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:38.486403 systemd[1]: Started sshd@9-139.178.70.110:22-147.75.109.163:40430.service. Dec 13 14:38:38.690000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.699825 kernel: audit: type=1101 audit(1734100718.690:1429): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.709566 kernel: audit: type=1103 audit(1734100718.699:1430): pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.709596 kernel: audit: type=1006 audit(1734100718.699:1431): pid=5331 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:38:38.718988 kernel: audit: type=1300 audit(1734100718.699:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb1336650 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:38.719018 kernel: audit: type=1327 audit(1734100718.699:1431): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:38.699000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.699000 audit[5331]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb1336650 a2=3 a3=0 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:38.699000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:38.739435 sshd[5331]: Accepted publickey for core from 147.75.109.163 port 40430 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:38.724100 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:38.752228 systemd[1]: Started session-12.scope. Dec 13 14:38:38.752876 systemd-logind[1243]: New session 12 of user core. Dec 13 14:38:38.755000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.759000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.763618 kernel: audit: type=1105 audit(1734100718.755:1432): pid=5331 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:38.763667 kernel: audit: type=1103 audit(1734100718.759:1433): pid=5333 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.477742 sshd[5331]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:39.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.110:22-147.75.109.163:40432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:39.492118 kernel: audit: type=1130 audit(1734100719.479:1434): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.110:22-147.75.109.163:40432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:39.480399 systemd[1]: Started sshd@10-139.178.70.110:22-147.75.109.163:40432.service. Dec 13 14:38:39.502000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.502000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.507780 kernel: audit: type=1106 audit(1734100719.502:1435): pid=5331 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-139.178.70.110:22-147.75.109.163:40430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:39.512019 systemd[1]: sshd@9-139.178.70.110:22-147.75.109.163:40430.service: Deactivated successfully. Dec 13 14:38:39.512599 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:38:39.513292 systemd-logind[1243]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:38:39.513796 systemd-logind[1243]: Removed session 12. Dec 13 14:38:39.681000 audit[5366]: USER_ACCT pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.682773 sshd[5366]: Accepted publickey for core from 147.75.109.163 port 40432 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:39.682981 sshd[5366]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:39.681000 audit[5366]: CRED_ACQ pid=5366 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.682000 audit[5366]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd85e47320 a2=3 a3=0 items=0 ppid=1 pid=5366 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:39.682000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:39.688000 audit[5366]: USER_START pid=5366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.689000 audit[5369]: CRED_ACQ pid=5369 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.686009 systemd[1]: Started session-13.scope. Dec 13 14:38:39.686153 systemd-logind[1243]: New session 13 of user core. Dec 13 14:38:39.937638 sshd[5366]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:39.937820 systemd[1]: Started sshd@11-139.178.70.110:22-147.75.109.163:40434.service. Dec 13 14:38:39.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.110:22-147.75.109.163:40434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:39.938000 audit[5366]: USER_END pid=5366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.938000 audit[5366]: CRED_DISP pid=5366 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.940367 systemd[1]: sshd@10-139.178.70.110:22-147.75.109.163:40432.service: Deactivated successfully. Dec 13 14:38:39.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-139.178.70.110:22-147.75.109.163:40432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:39.941228 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:38:39.941897 systemd-logind[1243]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:38:39.942443 systemd-logind[1243]: Removed session 13. Dec 13 14:38:39.980213 sshd[5379]: Accepted publickey for core from 147.75.109.163 port 40434 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:39.979000 audit[5379]: USER_ACCT pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.981460 sshd[5379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:39.980000 audit[5379]: CRED_ACQ pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.980000 audit[5379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc02f25910 a2=3 a3=0 items=0 ppid=1 pid=5379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:39.980000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:39.984640 systemd[1]: Started session-14.scope. Dec 13 14:38:39.987000 audit[5379]: USER_START pid=5379 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.994000 audit[5382]: CRED_ACQ pid=5382 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:39.985122 systemd-logind[1243]: New session 14 of user core. Dec 13 14:38:40.153880 sshd[5379]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:40.156000 audit[5379]: USER_END pid=5379 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:40.159000 audit[5379]: CRED_DISP pid=5379 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:40.161574 systemd[1]: sshd@11-139.178.70.110:22-147.75.109.163:40434.service: Deactivated successfully. Dec 13 14:38:40.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-139.178.70.110:22-147.75.109.163:40434 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:40.162085 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:38:40.162502 systemd-logind[1243]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:38:40.162989 systemd-logind[1243]: Removed session 14. Dec 13 14:38:45.152063 systemd[1]: Started sshd@12-139.178.70.110:22-147.75.109.163:40436.service. Dec 13 14:38:45.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.110:22-147.75.109.163:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:45.153835 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:38:45.153886 kernel: audit: type=1130 audit(1734100725.151:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.110:22-147.75.109.163:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:45.714000 audit[5394]: USER_ACCT pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.722901 kernel: audit: type=1101 audit(1734100725.714:1456): pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.725766 kernel: audit: type=1103 audit(1734100725.718:1457): pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.725807 kernel: audit: type=1006 audit(1734100725.718:1458): pid=5394 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:38:45.725827 kernel: audit: type=1300 audit(1734100725.718:1458): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8d4ebfb0 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:45.718000 audit[5394]: CRED_ACQ pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.718000 audit[5394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8d4ebfb0 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:45.725987 sshd[5394]: Accepted publickey for core from 147.75.109.163 port 40436 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:45.726319 sshd[5394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:45.718000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:45.728794 kernel: audit: type=1327 audit(1734100725.718:1458): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:45.730297 systemd-logind[1243]: New session 15 of user core. Dec 13 14:38:45.733000 audit[5394]: USER_START pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.740608 kernel: audit: type=1105 audit(1734100725.733:1459): pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.740647 kernel: audit: type=1103 audit(1734100725.737:1460): pid=5398 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.737000 audit[5398]: CRED_ACQ pid=5398 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.730796 systemd[1]: Started session-15.scope. Dec 13 14:38:45.852419 sshd[5394]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:45.852000 audit[5394]: USER_END pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.857328 systemd[1]: sshd@12-139.178.70.110:22-147.75.109.163:40436.service: Deactivated successfully. Dec 13 14:38:45.857785 kernel: audit: type=1106 audit(1734100725.852:1461): pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.857860 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:38:45.852000 audit[5394]: CRED_DISP pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.861777 kernel: audit: type=1104 audit(1734100725.852:1462): pid=5394 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:45.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-139.178.70.110:22-147.75.109.163:40436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:45.861580 systemd-logind[1243]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:38:45.862331 systemd-logind[1243]: Removed session 15. Dec 13 14:38:50.716000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:50.733111 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:38:50.733209 kernel: audit: type=1400 audit(1734100730.716:1464): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:50.733943 kernel: audit: type=1300 audit(1734100730.716:1464): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009aa740 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:50.733980 kernel: audit: type=1327 audit(1734100730.716:1464): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:50.734007 kernel: audit: type=1400 audit(1734100730.717:1465): avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:50.734030 kernel: audit: type=1300 audit(1734100730.717:1465): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aa62a0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:50.716000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0009aa740 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:50.749263 kernel: audit: type=1327 audit(1734100730.717:1465): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:50.716000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:50.717000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:50.717000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000aa62a0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:50.717000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:50.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.110:22-147.75.109.163:42470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:50.854797 systemd[1]: Started sshd@13-139.178.70.110:22-147.75.109.163:42470.service. Dec 13 14:38:50.858761 kernel: audit: type=1130 audit(1734100730.854:1466): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.110:22-147.75.109.163:42470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:50.955000 audit[5408]: USER_ACCT pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:50.956807 sshd[5408]: Accepted publickey for core from 147.75.109.163 port 42470 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:50.958000 audit[5408]: CRED_ACQ pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:50.960676 sshd[5408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:50.962403 kernel: audit: type=1101 audit(1734100730.955:1467): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:50.962447 kernel: audit: type=1103 audit(1734100730.958:1468): pid=5408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:50.964341 kernel: audit: type=1006 audit(1734100730.958:1469): pid=5408 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:38:50.958000 audit[5408]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec4cfb940 a2=3 a3=0 items=0 ppid=1 pid=5408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:50.958000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:50.969462 systemd-logind[1243]: New session 16 of user core. Dec 13 14:38:50.970016 systemd[1]: Started session-16.scope. Dec 13 14:38:50.972000 audit[5408]: USER_START pid=5408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:50.973000 audit[5410]: CRED_ACQ pid=5410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.311014 systemd[1]: Started sshd@14-139.178.70.110:22-147.75.109.163:42476.service. Dec 13 14:38:51.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.110:22-147.75.109.163:42476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:51.311970 sshd[5408]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:51.313000 audit[5408]: USER_END pid=5408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.314000 audit[5408]: CRED_DISP pid=5408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.316680 systemd[1]: sshd@13-139.178.70.110:22-147.75.109.163:42470.service: Deactivated successfully. Dec 13 14:38:51.317226 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:38:51.316000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-139.178.70.110:22-147.75.109.163:42470 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:51.317724 systemd-logind[1243]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:38:51.318520 systemd-logind[1243]: Removed session 16. Dec 13 14:38:51.361000 audit[5418]: USER_ACCT pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.362927 sshd[5418]: Accepted publickey for core from 147.75.109.163 port 42476 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:51.362000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.362000 audit[5418]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca49c50d0 a2=3 a3=0 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:51.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:51.363695 sshd[5418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:51.366981 systemd[1]: Started session-17.scope. Dec 13 14:38:51.367274 systemd-logind[1243]: New session 17 of user core. Dec 13 14:38:51.369000 audit[5418]: USER_START pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.370000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:51.518000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7300 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.518000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.518000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7b a1=c00f6d2390 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.518000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:51.518000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f956930 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.518000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:51.524000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7298 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.524000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00f6d23c0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:51.524000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.524000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7a a1=c00fa8e3a0 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:51.524000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.524000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=78 a1=c00f6d2420 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.524000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:51.530000 audit[1930]: AVC avc: denied { watch } for pid=1930 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:51.530000 audit[1930]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f938e80 a2=fc6 a3=0 items=0 ppid=1791 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c40,c111 key=(null) Dec 13 14:38:51.530000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133392E3137382E37302E313130002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Dec 13 14:38:52.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.110:22-147.75.109.163:42480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:52.295350 systemd[1]: Started sshd@15-139.178.70.110:22-147.75.109.163:42480.service. Dec 13 14:38:52.307797 sshd[5418]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:52.311000 audit[5418]: USER_END pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:52.312000 audit[5418]: CRED_DISP pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:52.321000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-139.178.70.110:22-147.75.109.163:42476 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:52.321787 systemd[1]: sshd@14-139.178.70.110:22-147.75.109.163:42476.service: Deactivated successfully. Dec 13 14:38:52.322573 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:38:52.322793 systemd-logind[1243]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:38:52.323260 systemd-logind[1243]: Removed session 17. Dec 13 14:38:52.467205 systemd[1]: run-containerd-runc-k8s.io-dc0b062a1ddf6aabcdc86b7637e46816f22ada52222d45d13a419e936d34ab8e-runc.oagWFI.mount: Deactivated successfully. Dec 13 14:38:52.477000 audit[5428]: USER_ACCT pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:52.478000 audit[5428]: CRED_ACQ pid=5428 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:52.479435 sshd[5428]: Accepted publickey for core from 147.75.109.163 port 42480 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:52.479000 audit[5428]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee3db9950 a2=3 a3=0 items=0 ppid=1 pid=5428 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:52.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:52.481369 sshd[5428]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:52.491188 systemd[1]: Started session-18.scope. Dec 13 14:38:52.491454 systemd-logind[1243]: New session 18 of user core. Dec 13 14:38:52.495000 audit[5428]: USER_START pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:52.496000 audit[5452]: CRED_ACQ pid=5452 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:53.500000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:53.500000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000440980 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:53.500000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:53.503000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:53.503000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000de4f60 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:53.503000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:53.503000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000de4fa0 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:53.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:53.503000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:53.514000 audit[1975]: AVC avc: denied { watch } for pid=1975 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7292 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:38:53.514000 audit[1975]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000440a80 a2=fc6 a3=0 items=0 ppid=1840 pid=1975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c905 key=(null) Dec 13 14:38:53.514000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:38:55.048248 sshd[5428]: pam_unix(sshd:session): session closed for user core Dec 13 14:38:55.092000 audit[5428]: USER_END pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:55.098000 audit[5428]: CRED_DISP pid=5428 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:55.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.110:22-147.75.109.163:42484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:55.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-139.178.70.110:22-147.75.109.163:42480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:38:55.123168 systemd[1]: Started sshd@16-139.178.70.110:22-147.75.109.163:42484.service. Dec 13 14:38:55.123578 systemd[1]: sshd@15-139.178.70.110:22-147.75.109.163:42480.service: Deactivated successfully. Dec 13 14:38:55.132453 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:38:55.133045 systemd-logind[1243]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:38:55.133644 systemd-logind[1243]: Removed session 18. Dec 13 14:38:55.601000 audit[5478]: NETFILTER_CFG table=filter:118 family=2 entries=20 op=nft_register_rule pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:55.601000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffebd3be9e0 a2=0 a3=7ffebd3be9cc items=0 ppid=2262 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:55.601000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:55.608000 audit[5478]: NETFILTER_CFG table=nat:119 family=2 entries=22 op=nft_register_rule pid=5478 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:55.608000 audit[5478]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffebd3be9e0 a2=0 a3=0 items=0 ppid=2262 pid=5478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:55.608000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:55.628000 audit[5480]: NETFILTER_CFG table=filter:120 family=2 entries=32 op=nft_register_rule pid=5480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:55.628000 audit[5480]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffdf452b700 a2=0 a3=7ffdf452b6ec items=0 ppid=2262 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:55.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:55.634000 audit[5480]: NETFILTER_CFG table=nat:121 family=2 entries=22 op=nft_register_rule pid=5480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:38:55.634000 audit[5480]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffdf452b700 a2=0 a3=0 items=0 ppid=2262 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:55.634000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:38:56.285801 sshd[5474]: Accepted publickey for core from 147.75.109.163 port 42484 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:38:56.307006 kernel: kauditd_printk_skb: 72 callbacks suppressed Dec 13 14:38:56.315555 kernel: audit: type=1101 audit(1734100736.284:1508): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.318540 kernel: audit: type=1103 audit(1734100736.290:1509): pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.318973 kernel: audit: type=1006 audit(1734100736.290:1510): pid=5474 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Dec 13 14:38:56.319898 kernel: audit: type=1300 audit(1734100736.290:1510): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8f21c20 a2=3 a3=0 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:56.319925 kernel: audit: type=1327 audit(1734100736.290:1510): proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:56.284000 audit[5474]: USER_ACCT pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.290000 audit[5474]: CRED_ACQ pid=5474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.290000 audit[5474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee8f21c20 a2=3 a3=0 items=0 ppid=1 pid=5474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:38:56.290000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:38:56.301412 sshd[5474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:38:56.350888 systemd-logind[1243]: New session 19 of user core. Dec 13 14:38:56.354000 audit[5474]: USER_START pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.351456 systemd[1]: Started session-19.scope. Dec 13 14:38:56.360280 kernel: audit: type=1105 audit(1734100736.354:1511): pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.361000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:56.366002 kernel: audit: type=1103 audit(1734100736.361:1512): pid=5481 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:38:59.965836 kubelet[2106]: E1213 14:38:59.965795 2106 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="3.502s" Dec 13 14:38:59.995163 env[1267]: time="2024-12-13T14:38:59.981405836Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.113 [WARNING][5500] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb", Pod:"coredns-6f6b679f8f-vlrm8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali709b553fe6a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.118 [INFO][5500] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.118 [INFO][5500] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" iface="eth0" netns="" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.118 [INFO][5500] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.118 [INFO][5500] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.513 [INFO][5509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.517 [INFO][5509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.518 [INFO][5509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.532 [WARNING][5509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.532 [INFO][5509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.533 [INFO][5509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:01.539677 env[1267]: 2024-12-13 14:39:01.538 [INFO][5500] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:01.585226 env[1267]: time="2024-12-13T14:39:01.539836246Z" level=info msg="TearDown network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" successfully" Dec 13 14:39:01.585226 env[1267]: time="2024-12-13T14:39:01.539863361Z" level=info msg="StopPodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" returns successfully" Dec 13 14:39:01.631811 env[1267]: time="2024-12-13T14:39:01.631785879Z" level=info msg="RemovePodSandbox for \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:39:01.632456 env[1267]: time="2024-12-13T14:39:01.631930789Z" level=info msg="Forcibly stopping sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\"" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:01.865 [WARNING][5532] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"fa1676bd-7424-4d30-adcd-2b0d84fbc6c6", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"49d332b0ff97895c534a23cb925dc6f3bb13f8da3a05f902f9e3eccb950e27fb", Pod:"coredns-6f6b679f8f-vlrm8", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali709b553fe6a", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:01.866 [INFO][5532] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:01.866 [INFO][5532] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" iface="eth0" netns="" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:01.866 [INFO][5532] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:01.866 [INFO][5532] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.120 [INFO][5538] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.124 [INFO][5538] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.125 [INFO][5538] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.170 [WARNING][5538] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.170 [INFO][5538] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" HandleID="k8s-pod-network.652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Workload="localhost-k8s-coredns--6f6b679f8f--vlrm8-eth0" Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.171 [INFO][5538] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:02.182375 env[1267]: 2024-12-13 14:39:02.173 [INFO][5532] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602" Dec 13 14:39:02.232743 env[1267]: time="2024-12-13T14:39:02.182537359Z" level=info msg="TearDown network for sandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" successfully" Dec 13 14:39:02.237965 sshd[5474]: pam_unix(sshd:session): session closed for user core Dec 13 14:39:02.269990 env[1267]: time="2024-12-13T14:39:02.242045608Z" level=info msg="RemovePodSandbox \"652bb165b3686fae8d42ef038c117fc0cde5685a15f03c3ead60eb1acc0f3602\" returns successfully" Dec 13 14:39:02.333577 systemd[1]: Started sshd@17-139.178.70.110:22-147.75.109.163:53810.service. Dec 13 14:39:02.371273 kernel: audit: type=1130 audit(1734100742.336:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.110:22-147.75.109.163:53810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:02.381970 kernel: audit: type=1106 audit(1734100742.340:1514): pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.382030 kernel: audit: type=1104 audit(1734100742.345:1515): pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.386093 kernel: audit: type=1131 audit(1734100742.357:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.110:22-147.75.109.163:42484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:02.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.110:22-147.75.109.163:53810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:02.340000 audit[5474]: USER_END pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.345000 audit[5474]: CRED_DISP pid=5474 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-139.178.70.110:22-147.75.109.163:42484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:02.356314 systemd[1]: sshd@16-139.178.70.110:22-147.75.109.163:42484.service: Deactivated successfully. Dec 13 14:39:02.358636 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:39:02.359315 systemd-logind[1243]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:39:02.363510 systemd-logind[1243]: Removed session 19. Dec 13 14:39:02.486000 audit[5546]: USER_ACCT pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.497517 kernel: audit: type=1101 audit(1734100742.486:1517): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.497569 kernel: audit: type=1103 audit(1734100742.491:1518): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.501208 kernel: audit: type=1006 audit(1734100742.494:1519): pid=5546 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Dec 13 14:39:02.501258 kernel: audit: type=1300 audit(1734100742.494:1519): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f79be10 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:02.491000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.502839 kernel: audit: type=1327 audit(1734100742.494:1519): proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:02.494000 audit[5546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9f79be10 a2=3 a3=0 items=0 ppid=1 pid=5546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:02.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:02.496934 sshd[5546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:39:02.521788 sshd[5546]: Accepted publickey for core from 147.75.109.163 port 53810 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:39:02.549069 systemd[1]: Started session-20.scope. Dec 13 14:39:02.549943 systemd-logind[1243]: New session 20 of user core. Dec 13 14:39:02.555000 audit[5546]: USER_START pid=5546 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.561797 kernel: audit: type=1105 audit(1734100742.555:1520): pid=5546 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.556000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:02.749000 audit[5554]: NETFILTER_CFG table=filter:122 family=2 entries=20 op=nft_register_rule pid=5554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:39:02.749000 audit[5554]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc2659f810 a2=0 a3=7ffc2659f7fc items=0 ppid=2262 pid=5554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:02.749000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:39:02.754000 audit[5554]: NETFILTER_CFG table=nat:123 family=2 entries=106 op=nft_register_chain pid=5554 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:39:02.754000 audit[5554]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffc2659f810 a2=0 a3=7ffc2659f7fc items=0 ppid=2262 pid=5554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:02.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:39:03.339229 env[1267]: time="2024-12-13T14:39:03.338320504Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.083 [WARNING][5571] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"61699123-ed1d-4a68-b972-8f873921908d", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2", Pod:"coredns-6f6b679f8f-v5ctd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif86d25b23ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.086 [INFO][5571] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.086 [INFO][5571] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" iface="eth0" netns="" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.086 [INFO][5571] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.086 [INFO][5571] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.612 [INFO][5577] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.614 [INFO][5577] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.615 [INFO][5577] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.632 [WARNING][5577] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.632 [INFO][5577] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.633 [INFO][5577] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:04.637733 env[1267]: 2024-12-13 14:39:04.635 [INFO][5571] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:04.689738 env[1267]: time="2024-12-13T14:39:04.637878584Z" level=info msg="TearDown network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" successfully" Dec 13 14:39:04.689738 env[1267]: time="2024-12-13T14:39:04.637900328Z" level=info msg="StopPodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" returns successfully" Dec 13 14:39:05.058579 kubelet[2106]: E1213 14:39:05.056029 2106 kubelet.go:2512] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="1.989s" Dec 13 14:39:05.161659 env[1267]: time="2024-12-13T14:39:05.161406357Z" level=info msg="RemovePodSandbox for \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:39:05.161659 env[1267]: time="2024-12-13T14:39:05.161430167Z" level=info msg="Forcibly stopping sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\"" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.327 [WARNING][5596] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"61699123-ed1d-4a68-b972-8f873921908d", ResourceVersion:"1000", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 36, 58, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"286d97d64c7c0a6ec64f48a7682eb4c7bb02bb90595c97e2309749f6211900e2", Pod:"coredns-6f6b679f8f-v5ctd", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calif86d25b23ea", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.329 [INFO][5596] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.329 [INFO][5596] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" iface="eth0" netns="" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.329 [INFO][5596] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.329 [INFO][5596] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.699 [INFO][5602] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.701 [INFO][5602] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.701 [INFO][5602] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.707 [WARNING][5602] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.707 [INFO][5602] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" HandleID="k8s-pod-network.9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Workload="localhost-k8s-coredns--6f6b679f8f--v5ctd-eth0" Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.708 [INFO][5602] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:05.713230 env[1267]: 2024-12-13 14:39:05.712 [INFO][5596] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6" Dec 13 14:39:05.721638 env[1267]: time="2024-12-13T14:39:05.713819785Z" level=info msg="TearDown network for sandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" successfully" Dec 13 14:39:05.723871 env[1267]: time="2024-12-13T14:39:05.723287440Z" level=info msg="RemovePodSandbox \"9d6fd7d79c1a9bd276885c3e8abc6e048adcdcd9e329f9f56c834f7b039416e6\" returns successfully" Dec 13 14:39:05.738064 env[1267]: time="2024-12-13T14:39:05.738032515Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.800 [WARNING][5621] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rskds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"137b900f-a1c0-406e-87c9-33eedf71f128", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee", Pod:"csi-node-driver-rskds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali352cc01dcc4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.800 [INFO][5621] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.800 [INFO][5621] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" iface="eth0" netns="" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.800 [INFO][5621] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.800 [INFO][5621] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.816 [INFO][5627] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.816 [INFO][5627] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.816 [INFO][5627] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.821 [WARNING][5627] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.821 [INFO][5627] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.822 [INFO][5627] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:05.825122 env[1267]: 2024-12-13 14:39:05.823 [INFO][5621] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.829210 env[1267]: time="2024-12-13T14:39:05.825142298Z" level=info msg="TearDown network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" successfully" Dec 13 14:39:05.829210 env[1267]: time="2024-12-13T14:39:05.825164133Z" level=info msg="StopPodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" returns successfully" Dec 13 14:39:05.829210 env[1267]: time="2024-12-13T14:39:05.825987603Z" level=info msg="RemovePodSandbox for \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:39:05.829210 env[1267]: time="2024-12-13T14:39:05.826008216Z" level=info msg="Forcibly stopping sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\"" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.871 [WARNING][5647] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rskds-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"137b900f-a1c0-406e-87c9-33eedf71f128", ResourceVersion:"1064", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"d5d5562257d2f094a2a2bd1f37f7729951375299bcd0e009b8298d067f1a6aee", Pod:"csi-node-driver-rskds", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali352cc01dcc4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.872 [INFO][5647] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.872 [INFO][5647] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" iface="eth0" netns="" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.872 [INFO][5647] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.872 [INFO][5647] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.929 [INFO][5654] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.929 [INFO][5654] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.929 [INFO][5654] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.975 [WARNING][5654] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.975 [INFO][5654] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" HandleID="k8s-pod-network.6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Workload="localhost-k8s-csi--node--driver--rskds-eth0" Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.976 [INFO][5654] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:05.979931 env[1267]: 2024-12-13 14:39:05.977 [INFO][5647] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b" Dec 13 14:39:06.023552 env[1267]: time="2024-12-13T14:39:05.980149754Z" level=info msg="TearDown network for sandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" successfully" Dec 13 14:39:06.024321 env[1267]: time="2024-12-13T14:39:06.024295781Z" level=info msg="RemovePodSandbox \"6ac0d5ba70a677dcf268653de918650dbd90b6c92a4a80bd8f5a9e232eaef59b\" returns successfully" Dec 13 14:39:06.025419 env[1267]: time="2024-12-13T14:39:06.024662577Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.063 [WARNING][5672] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c486ab2-af5a-49b0-bbba-d82678b97543", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8", Pod:"calico-apiserver-85f8cf69df-6ztsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia21fd325bce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.063 [INFO][5672] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.063 [INFO][5672] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" iface="eth0" netns="" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.063 [INFO][5672] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.063 [INFO][5672] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.093 [INFO][5679] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.094 [INFO][5679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.094 [INFO][5679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.105 [WARNING][5679] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.105 [INFO][5679] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.106 [INFO][5679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.109542 env[1267]: 2024-12-13 14:39:06.107 [INFO][5672] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.113866 env[1267]: time="2024-12-13T14:39:06.109683499Z" level=info msg="TearDown network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" successfully" Dec 13 14:39:06.113866 env[1267]: time="2024-12-13T14:39:06.109707140Z" level=info msg="StopPodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" returns successfully" Dec 13 14:39:06.113866 env[1267]: time="2024-12-13T14:39:06.110329265Z" level=info msg="RemovePodSandbox for \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:39:06.113866 env[1267]: time="2024-12-13T14:39:06.110347676Z" level=info msg="Forcibly stopping sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\"" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.145 [WARNING][5700] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"1c486ab2-af5a-49b0-bbba-d82678b97543", ResourceVersion:"917", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6cbad4ec6fd5b0b7325c9e929d1da6845658986f8b3e8e9fd3e43179e3a5d5b8", Pod:"calico-apiserver-85f8cf69df-6ztsn", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia21fd325bce", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.146 [INFO][5700] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.146 [INFO][5700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" iface="eth0" netns="" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.146 [INFO][5700] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.146 [INFO][5700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.168 [INFO][5706] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.169 [INFO][5706] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.169 [INFO][5706] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.172 [WARNING][5706] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.172 [INFO][5706] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" HandleID="k8s-pod-network.10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Workload="localhost-k8s-calico--apiserver--85f8cf69df--6ztsn-eth0" Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.173 [INFO][5706] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.175715 env[1267]: 2024-12-13 14:39:06.174 [INFO][5700] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9" Dec 13 14:39:06.177583 env[1267]: time="2024-12-13T14:39:06.175919904Z" level=info msg="TearDown network for sandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" successfully" Dec 13 14:39:06.180299 env[1267]: time="2024-12-13T14:39:06.180285263Z" level=info msg="RemovePodSandbox \"10050408fd382d376b35471cb8025a54fe41db1530652b0dcae3ca6433c27bc9\" returns successfully" Dec 13 14:39:06.181915 env[1267]: time="2024-12-13T14:39:06.180655588Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.204 [WARNING][5725] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0", GenerateName:"calico-kube-controllers-5b8b7d84bb-", Namespace:"calico-system", SelfLink:"", UID:"c6d1116b-f94f-4e6c-a472-6990e3046598", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b8b7d84bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184", Pod:"calico-kube-controllers-5b8b7d84bb-qdzc8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98c9f229aa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.204 [INFO][5725] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.204 [INFO][5725] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" iface="eth0" netns="" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.204 [INFO][5725] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.204 [INFO][5725] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.231 [INFO][5732] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.231 [INFO][5732] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.231 [INFO][5732] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.243 [WARNING][5732] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.243 [INFO][5732] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.243 [INFO][5732] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.248792 env[1267]: 2024-12-13 14:39:06.247 [INFO][5725] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.250914 env[1267]: time="2024-12-13T14:39:06.250240607Z" level=info msg="TearDown network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" successfully" Dec 13 14:39:06.250914 env[1267]: time="2024-12-13T14:39:06.250266958Z" level=info msg="StopPodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" returns successfully" Dec 13 14:39:06.250914 env[1267]: time="2024-12-13T14:39:06.250599754Z" level=info msg="RemovePodSandbox for \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:39:06.250914 env[1267]: time="2024-12-13T14:39:06.250619101Z" level=info msg="Forcibly stopping sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\"" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.283 [WARNING][5755] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0", GenerateName:"calico-kube-controllers-5b8b7d84bb-", Namespace:"calico-system", SelfLink:"", UID:"c6d1116b-f94f-4e6c-a472-6990e3046598", ResourceVersion:"1047", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b8b7d84bb", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"44934b409e93a0e614b0db2fce17b28e60d34bd81046793b07982c86ee171184", Pod:"calico-kube-controllers-5b8b7d84bb-qdzc8", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali98c9f229aa4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.283 [INFO][5755] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.283 [INFO][5755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" iface="eth0" netns="" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.283 [INFO][5755] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.283 [INFO][5755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.309 [INFO][5761] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.309 [INFO][5761] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.309 [INFO][5761] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.313 [WARNING][5761] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.313 [INFO][5761] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" HandleID="k8s-pod-network.cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Workload="localhost-k8s-calico--kube--controllers--5b8b7d84bb--qdzc8-eth0" Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.315 [INFO][5761] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.318364 env[1267]: 2024-12-13 14:39:06.317 [INFO][5755] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead" Dec 13 14:39:06.322420 env[1267]: time="2024-12-13T14:39:06.318384991Z" level=info msg="TearDown network for sandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" successfully" Dec 13 14:39:06.325030 env[1267]: time="2024-12-13T14:39:06.325010018Z" level=info msg="RemovePodSandbox \"cbd9356c9d2b9460c8c75cf3029063ac59cada74c23f14e5502f906bce35cead\" returns successfully" Dec 13 14:39:06.325385 env[1267]: time="2024-12-13T14:39:06.325357920Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:39:06.362234 sshd[5546]: pam_unix(sshd:session): session closed for user core Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.351 [WARNING][5779] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9707d41e-752b-4a91-9ca8-26fd0005b824", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d", Pod:"calico-apiserver-85f8cf69df-pjb27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5466d1b5fa1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.351 [INFO][5779] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.351 [INFO][5779] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" iface="eth0" netns="" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.351 [INFO][5779] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.351 [INFO][5779] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.378 [INFO][5786] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.378 [INFO][5786] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.378 [INFO][5786] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.382 [WARNING][5786] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.382 [INFO][5786] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.383 [INFO][5786] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.391177 env[1267]: 2024-12-13 14:39:06.385 [INFO][5779] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.391177 env[1267]: time="2024-12-13T14:39:06.386543492Z" level=info msg="TearDown network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" successfully" Dec 13 14:39:06.391177 env[1267]: time="2024-12-13T14:39:06.386564520Z" level=info msg="StopPodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" returns successfully" Dec 13 14:39:06.391177 env[1267]: time="2024-12-13T14:39:06.386935143Z" level=info msg="RemovePodSandbox for \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:39:06.391177 env[1267]: time="2024-12-13T14:39:06.386967052Z" level=info msg="Forcibly stopping sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\"" Dec 13 14:39:06.406000 audit[5546]: USER_END pid=5546 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:06.407000 audit[5546]: CRED_DISP pid=5546 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:06.425426 systemd[1]: sshd@17-139.178.70.110:22-147.75.109.163:53810.service: Deactivated successfully. Dec 13 14:39:06.428000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-139.178.70.110:22-147.75.109.163:53810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:06.431984 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:39:06.434633 systemd-logind[1243]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:39:06.441560 systemd-logind[1243]: Removed session 20. Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.446 [WARNING][5806] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0", GenerateName:"calico-apiserver-85f8cf69df-", Namespace:"calico-apiserver", SelfLink:"", UID:"9707d41e-752b-4a91-9ca8-26fd0005b824", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 37, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"85f8cf69df", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bbf15143dc99b2b94d89f317bb0f078365c56f59f824af16786173cd2a2b139d", Pod:"calico-apiserver-85f8cf69df-pjb27", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5466d1b5fa1", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.446 [INFO][5806] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.446 [INFO][5806] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" iface="eth0" netns="" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.446 [INFO][5806] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.446 [INFO][5806] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.475 [INFO][5814] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.475 [INFO][5814] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.475 [INFO][5814] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.540 [WARNING][5814] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.540 [INFO][5814] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" HandleID="k8s-pod-network.1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Workload="localhost-k8s-calico--apiserver--85f8cf69df--pjb27-eth0" Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.541 [INFO][5814] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:39:06.545460 env[1267]: 2024-12-13 14:39:06.543 [INFO][5806] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807" Dec 13 14:39:06.545460 env[1267]: time="2024-12-13T14:39:06.544396735Z" level=info msg="TearDown network for sandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" successfully" Dec 13 14:39:06.857734 env[1267]: time="2024-12-13T14:39:06.857657243Z" level=info msg="RemovePodSandbox \"1d5ef0597b1165454b901b1370d7bfd2676cc5721542dce8f8f5ec0a3b8c1807\" returns successfully" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.857998319Z" level=info msg="StopPodSandbox for \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\"" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.858046039Z" level=info msg="TearDown network for sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" successfully" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.858067939Z" level=info msg="StopPodSandbox for \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" returns successfully" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.858624176Z" level=info msg="RemovePodSandbox for \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\"" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.858643311Z" level=info msg="Forcibly stopping sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\"" Dec 13 14:39:06.859236 env[1267]: time="2024-12-13T14:39:06.858701969Z" level=info msg="TearDown network for sandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" successfully" Dec 13 14:39:06.889688 env[1267]: time="2024-12-13T14:39:06.889654455Z" level=info msg="RemovePodSandbox \"687ebce87dd2500e75d238087bcb28f7e5447f44f11361e4026f0726566ed408\" returns successfully" Dec 13 14:39:11.474315 systemd[1]: Started sshd@18-139.178.70.110:22-147.75.109.163:37314.service. Dec 13 14:39:11.742970 kernel: kauditd_printk_skb: 10 callbacks suppressed Dec 13 14:39:11.748562 kernel: audit: type=1130 audit(1734100751.486:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.110:22-147.75.109.163:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:11.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.110:22-147.75.109.163:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:11.881000 audit[5844]: USER_ACCT pid=5844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:11.892849 kernel: audit: type=1101 audit(1734100751.881:1528): pid=5844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:11.896061 kernel: audit: type=1103 audit(1734100751.886:1529): pid=5844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:11.897216 kernel: audit: type=1006 audit(1734100751.886:1530): pid=5844 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Dec 13 14:39:11.897243 kernel: audit: type=1300 audit(1734100751.886:1530): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8aef7b10 a2=3 a3=0 items=0 ppid=1 pid=5844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:11.897266 kernel: audit: type=1327 audit(1734100751.886:1530): proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:11.886000 audit[5844]: CRED_ACQ pid=5844 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:11.886000 audit[5844]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8aef7b10 a2=3 a3=0 items=0 ppid=1 pid=5844 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:11.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:11.954966 sshd[5844]: Accepted publickey for core from 147.75.109.163 port 37314 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:39:11.897678 sshd[5844]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:39:11.991198 systemd-logind[1243]: New session 21 of user core. Dec 13 14:39:11.994327 systemd[1]: Started session-21.scope. Dec 13 14:39:11.997000 audit[5844]: USER_START pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.002789 kernel: audit: type=1105 audit(1734100751.997:1531): pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.004000 audit[5846]: CRED_ACQ pid=5846 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.014054 kernel: audit: type=1103 audit(1734100752.004:1532): pid=5846 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.744386 sshd[5844]: pam_unix(sshd:session): session closed for user core Dec 13 14:39:12.748000 audit[5844]: USER_END pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.756301 kernel: audit: type=1106 audit(1734100752.748:1533): pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.756435 kernel: audit: type=1104 audit(1734100752.749:1534): pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.749000 audit[5844]: CRED_DISP pid=5844 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:12.766137 systemd-logind[1243]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:39:12.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-139.178.70.110:22-147.75.109.163:37314 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:12.767766 systemd[1]: sshd@18-139.178.70.110:22-147.75.109.163:37314.service: Deactivated successfully. Dec 13 14:39:12.769262 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:39:12.770797 systemd-logind[1243]: Removed session 21. Dec 13 14:39:15.877000 audit[4613]: AVC avc: denied { watch } for pid=4613 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_17.2660114332/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c276,c971 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c276,c971 tclass=file permissive=0 Dec 13 14:39:15.877000 audit[4613]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c78f80 a2=fc6 a3=0 items=0 ppid=4489 pid=4613 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c276,c971 key=(null) Dec 13 14:39:15.877000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:15.893000 audit[4572]: AVC avc: denied { watch } for pid=4572 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_37_17.2098886771/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c61,c101 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c61,c101 tclass=file permissive=0 Dec 13 14:39:15.893000 audit[4572]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0023f48c0 a2=fc6 a3=0 items=0 ppid=4179 pid=4572 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c61,c101 key=(null) Dec 13 14:39:15.893000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:39:17.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.110:22-147.75.109.163:59724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:17.753923 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:39:17.757188 kernel: audit: type=1130 audit(1734100757.744:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.110:22-147.75.109.163:59724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:17.745088 systemd[1]: Started sshd@19-139.178.70.110:22-147.75.109.163:59724.service. Dec 13 14:39:17.885000 audit[5856]: USER_ACCT pid=5856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.890985 kernel: audit: type=1101 audit(1734100757.885:1539): pid=5856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.894359 kernel: audit: type=1103 audit(1734100757.890:1540): pid=5856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.894387 kernel: audit: type=1006 audit(1734100757.890:1541): pid=5856 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:39:17.890000 audit[5856]: CRED_ACQ pid=5856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.894461 sshd[5856]: Accepted publickey for core from 147.75.109.163 port 59724 ssh2: RSA SHA256:5q8yTx+As0Vff3UrjyPz+2PuY12dnKLT6DaRxRjSOrk Dec 13 14:39:17.896289 kernel: audit: type=1300 audit(1734100757.890:1541): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbd704b0 a2=3 a3=0 items=0 ppid=1 pid=5856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:17.890000 audit[5856]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedbd704b0 a2=3 a3=0 items=0 ppid=1 pid=5856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:39:17.901181 kernel: audit: type=1327 audit(1734100757.890:1541): proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:17.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:39:17.901027 sshd[5856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:39:17.905653 systemd-logind[1243]: New session 22 of user core. Dec 13 14:39:17.906658 systemd[1]: Started session-22.scope. Dec 13 14:39:17.908000 audit[5856]: USER_START pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.912000 audit[5858]: CRED_ACQ pid=5858 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.916647 kernel: audit: type=1105 audit(1734100757.908:1542): pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:17.917462 kernel: audit: type=1103 audit(1734100757.912:1543): pid=5858 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:18.333196 sshd[5856]: pam_unix(sshd:session): session closed for user core Dec 13 14:39:18.333000 audit[5856]: USER_END pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:18.340866 kernel: audit: type=1106 audit(1734100758.333:1544): pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:18.340906 kernel: audit: type=1104 audit(1734100758.333:1545): pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:18.333000 audit[5856]: CRED_DISP pid=5856 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' Dec 13 14:39:18.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-139.178.70.110:22-147.75.109.163:59724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:39:18.342310 systemd[1]: sshd@19-139.178.70.110:22-147.75.109.163:59724.service: Deactivated successfully. Dec 13 14:39:18.342833 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:39:18.343104 systemd-logind[1243]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:39:18.343866 systemd-logind[1243]: Removed session 22.