Dec 13 14:04:56.034989 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:04:56.035008 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:04:56.035016 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Dec 13 14:04:56.035024 kernel: printk: bootconsole [pl11] enabled Dec 13 14:04:56.035029 kernel: efi: EFI v2.70 by EDK II Dec 13 14:04:56.035034 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3ead8b98 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Dec 13 14:04:56.035040 kernel: random: crng init done Dec 13 14:04:56.035046 kernel: ACPI: Early table checksum verification disabled Dec 13 14:04:56.035051 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Dec 13 14:04:56.035057 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035062 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035068 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Dec 13 14:04:56.035075 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035081 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035087 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035093 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035099 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035106 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035112 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Dec 13 14:04:56.035117 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:04:56.035123 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Dec 13 14:04:56.035129 kernel: NUMA: Failed to initialise from firmware Dec 13 14:04:56.035134 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:04:56.035140 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Dec 13 14:04:56.035146 kernel: Zone ranges: Dec 13 14:04:56.035151 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Dec 13 14:04:56.035157 kernel: DMA32 empty Dec 13 14:04:56.035162 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:04:56.035169 kernel: Movable zone start for each node Dec 13 14:04:56.035175 kernel: Early memory node ranges Dec 13 14:04:56.035181 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Dec 13 14:04:56.035187 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Dec 13 14:04:56.035192 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Dec 13 14:04:56.035198 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Dec 13 14:04:56.035203 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Dec 13 14:04:56.035209 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Dec 13 14:04:56.035215 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:04:56.035220 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:04:56.035226 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Dec 13 14:04:56.035232 kernel: psci: probing for conduit method from ACPI. Dec 13 14:04:56.035241 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:04:56.035247 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:04:56.035253 kernel: psci: MIGRATE_INFO_TYPE not supported. Dec 13 14:04:56.035259 kernel: psci: SMC Calling Convention v1.4 Dec 13 14:04:56.035265 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Dec 13 14:04:56.035272 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Dec 13 14:04:56.035278 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:04:56.035284 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:04:56.035290 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:04:56.035296 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:04:56.035303 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:04:56.035309 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:04:56.035315 kernel: CPU features: detected: Spectre-BHB Dec 13 14:04:56.035321 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:04:56.035327 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:04:56.035333 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:04:56.035340 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Dec 13 14:04:56.035347 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:04:56.035353 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Dec 13 14:04:56.035359 kernel: Policy zone: Normal Dec 13 14:04:56.035366 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:04:56.035373 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:04:56.035379 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:04:56.035385 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:04:56.035391 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:04:56.035397 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Dec 13 14:04:56.035404 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) Dec 13 14:04:56.035411 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:04:56.035417 kernel: trace event string verifier disabled Dec 13 14:04:56.035423 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:04:56.035430 kernel: rcu: RCU event tracing is enabled. Dec 13 14:04:56.035436 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:04:56.035442 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:04:56.035448 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:04:56.035454 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:04:56.035461 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:04:56.035467 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:04:56.035473 kernel: GICv3: 960 SPIs implemented Dec 13 14:04:56.035480 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:04:56.035486 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:04:56.035492 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:04:56.035498 kernel: GICv3: 16 PPIs implemented Dec 13 14:04:56.035504 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Dec 13 14:04:56.035510 kernel: ITS: No ITS available, not enabling LPIs Dec 13 14:04:56.035516 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:04:56.035522 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:04:56.035529 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:04:56.035535 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:04:56.035541 kernel: Console: colour dummy device 80x25 Dec 13 14:04:56.035549 kernel: printk: console [tty1] enabled Dec 13 14:04:56.035555 kernel: ACPI: Core revision 20210730 Dec 13 14:04:56.035562 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:04:56.035568 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:04:56.035574 kernel: LSM: Security Framework initializing Dec 13 14:04:56.035581 kernel: SELinux: Initializing. Dec 13 14:04:56.035587 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:04:56.035594 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:04:56.035600 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Dec 13 14:04:56.035608 kernel: Hyper-V: Host Build 10.0.22477.1594-1-0 Dec 13 14:04:56.035615 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:04:56.035621 kernel: Remapping and enabling EFI services. Dec 13 14:04:56.035627 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:04:56.035633 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:04:56.035640 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Dec 13 14:04:56.035647 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:04:56.035653 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:04:56.035659 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:04:56.035666 kernel: SMP: Total of 2 processors activated. Dec 13 14:04:56.035673 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:04:56.035693 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Dec 13 14:04:56.035701 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:04:56.042744 kernel: CPU features: detected: CRC32 instructions Dec 13 14:04:56.042762 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:04:56.042769 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:04:56.042776 kernel: CPU features: detected: Privileged Access Never Dec 13 14:04:56.042783 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:04:56.042790 kernel: alternatives: patching kernel code Dec 13 14:04:56.042803 kernel: devtmpfs: initialized Dec 13 14:04:56.042814 kernel: KASLR enabled Dec 13 14:04:56.042822 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:04:56.042830 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:04:56.042836 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:04:56.042843 kernel: SMBIOS 3.1.0 present. Dec 13 14:04:56.042850 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Dec 13 14:04:56.042857 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:04:56.042865 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:04:56.042873 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:04:56.042880 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:04:56.042886 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:04:56.042893 kernel: audit: type=2000 audit(0.090:1): state=initialized audit_enabled=0 res=1 Dec 13 14:04:56.042900 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:04:56.042906 kernel: cpuidle: using governor menu Dec 13 14:04:56.042913 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:04:56.042921 kernel: ASID allocator initialised with 32768 entries Dec 13 14:04:56.042928 kernel: ACPI: bus type PCI registered Dec 13 14:04:56.042935 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:04:56.042941 kernel: Serial: AMBA PL011 UART driver Dec 13 14:04:56.042948 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:04:56.042955 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:04:56.042962 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:04:56.042969 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:04:56.042976 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:04:56.042984 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:04:56.042991 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:04:56.042998 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:04:56.043005 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:04:56.043012 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:04:56.043018 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:04:56.043025 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:04:56.043032 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:04:56.043039 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:04:56.043047 kernel: ACPI: Interpreter enabled Dec 13 14:04:56.043054 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:04:56.043061 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:04:56.043067 kernel: printk: console [ttyAMA0] enabled Dec 13 14:04:56.043074 kernel: printk: bootconsole [pl11] disabled Dec 13 14:04:56.043081 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Dec 13 14:04:56.043088 kernel: iommu: Default domain type: Translated Dec 13 14:04:56.043095 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:04:56.043102 kernel: vgaarb: loaded Dec 13 14:04:56.043109 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:04:56.043117 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:04:56.043123 kernel: PTP clock support registered Dec 13 14:04:56.043130 kernel: Registered efivars operations Dec 13 14:04:56.043137 kernel: No ACPI PMU IRQ for CPU0 Dec 13 14:04:56.043144 kernel: No ACPI PMU IRQ for CPU1 Dec 13 14:04:56.043150 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:04:56.043157 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:04:56.043163 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:04:56.043172 kernel: pnp: PnP ACPI init Dec 13 14:04:56.043179 kernel: pnp: PnP ACPI: found 0 devices Dec 13 14:04:56.043185 kernel: NET: Registered PF_INET protocol family Dec 13 14:04:56.043192 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:04:56.043199 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:04:56.043206 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:04:56.043213 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:04:56.043219 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:04:56.043226 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:04:56.043235 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:04:56.043242 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:04:56.043248 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:04:56.043255 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:04:56.043262 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Dec 13 14:04:56.043269 kernel: kvm [1]: HYP mode not available Dec 13 14:04:56.043275 kernel: Initialise system trusted keyrings Dec 13 14:04:56.043282 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:04:56.043289 kernel: Key type asymmetric registered Dec 13 14:04:56.043297 kernel: Asymmetric key parser 'x509' registered Dec 13 14:04:56.043303 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:04:56.043310 kernel: io scheduler mq-deadline registered Dec 13 14:04:56.043317 kernel: io scheduler kyber registered Dec 13 14:04:56.043323 kernel: io scheduler bfq registered Dec 13 14:04:56.043330 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:04:56.043336 kernel: thunder_xcv, ver 1.0 Dec 13 14:04:56.043343 kernel: thunder_bgx, ver 1.0 Dec 13 14:04:56.043350 kernel: nicpf, ver 1.0 Dec 13 14:04:56.043356 kernel: nicvf, ver 1.0 Dec 13 14:04:56.043518 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:04:56.043579 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:04:55 UTC (1734098695) Dec 13 14:04:56.043588 kernel: efifb: probing for efifb Dec 13 14:04:56.043595 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:04:56.043602 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:04:56.043608 kernel: efifb: scrolling: redraw Dec 13 14:04:56.043616 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:04:56.043624 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:04:56.043631 kernel: fb0: EFI VGA frame buffer device Dec 13 14:04:56.043638 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Dec 13 14:04:56.043644 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:04:56.043651 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:04:56.043658 kernel: Segment Routing with IPv6 Dec 13 14:04:56.043664 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:04:56.043671 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:04:56.043678 kernel: Key type dns_resolver registered Dec 13 14:04:56.043708 kernel: registered taskstats version 1 Dec 13 14:04:56.043716 kernel: Loading compiled-in X.509 certificates Dec 13 14:04:56.043723 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:04:56.043730 kernel: Key type .fscrypt registered Dec 13 14:04:56.043737 kernel: Key type fscrypt-provisioning registered Dec 13 14:04:56.043744 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:04:56.043751 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:04:56.043757 kernel: ima: No architecture policies found Dec 13 14:04:56.043764 kernel: clk: Disabling unused clocks Dec 13 14:04:56.043772 kernel: Freeing unused kernel memory: 36416K Dec 13 14:04:56.043779 kernel: Run /init as init process Dec 13 14:04:56.043786 kernel: with arguments: Dec 13 14:04:56.043793 kernel: /init Dec 13 14:04:56.043799 kernel: with environment: Dec 13 14:04:56.043806 kernel: HOME=/ Dec 13 14:04:56.043812 kernel: TERM=linux Dec 13 14:04:56.043819 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:04:56.043828 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:04:56.043838 systemd[1]: Detected virtualization microsoft. Dec 13 14:04:56.043846 systemd[1]: Detected architecture arm64. Dec 13 14:04:56.043853 systemd[1]: Running in initrd. Dec 13 14:04:56.043860 systemd[1]: No hostname configured, using default hostname. Dec 13 14:04:56.043867 systemd[1]: Hostname set to . Dec 13 14:04:56.043874 systemd[1]: Initializing machine ID from random generator. Dec 13 14:04:56.043882 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:04:56.043890 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:04:56.043897 systemd[1]: Reached target cryptsetup.target. Dec 13 14:04:56.043904 systemd[1]: Reached target paths.target. Dec 13 14:04:56.043911 systemd[1]: Reached target slices.target. Dec 13 14:04:56.043918 systemd[1]: Reached target swap.target. Dec 13 14:04:56.043925 systemd[1]: Reached target timers.target. Dec 13 14:04:56.043933 systemd[1]: Listening on iscsid.socket. Dec 13 14:04:56.043940 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:04:56.043949 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:04:56.043956 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:04:56.043963 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:04:56.043971 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:04:56.043978 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:04:56.043985 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:04:56.043992 systemd[1]: Reached target sockets.target. Dec 13 14:04:56.044000 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:04:56.044007 systemd[1]: Finished network-cleanup.service. Dec 13 14:04:56.044016 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:04:56.044023 systemd[1]: Starting systemd-journald.service... Dec 13 14:04:56.044031 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:04:56.044038 systemd[1]: Starting systemd-resolved.service... Dec 13 14:04:56.044045 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:04:56.044057 systemd-journald[276]: Journal started Dec 13 14:04:56.044103 systemd-journald[276]: Runtime Journal (/run/log/journal/9294dc004c7b4d698d5c8b4ab634a603) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:04:56.018651 systemd-modules-load[277]: Inserted module 'overlay' Dec 13 14:04:56.060207 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:04:56.068367 systemd-modules-load[277]: Inserted module 'br_netfilter' Dec 13 14:04:56.077838 kernel: Bridge firewalling registered Dec 13 14:04:56.077859 systemd[1]: Started systemd-journald.service. Dec 13 14:04:56.077916 systemd-resolved[278]: Positive Trust Anchors: Dec 13 14:04:56.148534 kernel: audit: type=1130 audit(1734098696.084:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.148565 kernel: SCSI subsystem initialized Dec 13 14:04:56.148574 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:04:56.148583 kernel: audit: type=1130 audit(1734098696.116:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.148592 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:04:56.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.077931 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:04:56.167779 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:04:56.077958 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:04:56.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.084350 systemd-resolved[278]: Defaulting to hostname 'linux'. Dec 13 14:04:56.103164 systemd[1]: Started systemd-resolved.service. Dec 13 14:04:56.251049 kernel: audit: type=1130 audit(1734098696.172:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.251075 kernel: audit: type=1130 audit(1734098696.230:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.126793 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:04:56.166910 systemd-modules-load[277]: Inserted module 'dm_multipath' Dec 13 14:04:56.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.221761 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:04:56.310126 kernel: audit: type=1130 audit(1734098696.255:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.310146 kernel: audit: type=1130 audit(1734098696.280:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.231118 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:04:56.255953 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:04:56.281274 systemd[1]: Reached target nss-lookup.target. Dec 13 14:04:56.305823 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:04:56.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.315322 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:04:56.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.328938 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:04:56.397798 kernel: audit: type=1130 audit(1734098696.348:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.397820 kernel: audit: type=1130 audit(1734098696.371:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.344028 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:04:56.402000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.367446 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:04:56.428755 kernel: audit: type=1130 audit(1734098696.402:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.392823 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:04:56.428169 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:04:56.444068 dracut-cmdline[299]: dracut-dracut-053 Dec 13 14:04:56.448267 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:04:56.511718 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:04:56.527716 kernel: iscsi: registered transport (tcp) Dec 13 14:04:56.548464 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:04:56.548528 kernel: QLogic iSCSI HBA Driver Dec 13 14:04:56.584526 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:04:56.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:56.594390 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:04:56.643702 kernel: raid6: neonx8 gen() 13812 MB/s Dec 13 14:04:56.663693 kernel: raid6: neonx8 xor() 10835 MB/s Dec 13 14:04:56.683692 kernel: raid6: neonx4 gen() 13521 MB/s Dec 13 14:04:56.704692 kernel: raid6: neonx4 xor() 11317 MB/s Dec 13 14:04:56.726691 kernel: raid6: neonx2 gen() 12959 MB/s Dec 13 14:04:56.746690 kernel: raid6: neonx2 xor() 10412 MB/s Dec 13 14:04:56.767690 kernel: raid6: neonx1 gen() 10542 MB/s Dec 13 14:04:56.788691 kernel: raid6: neonx1 xor() 8787 MB/s Dec 13 14:04:56.808691 kernel: raid6: int64x8 gen() 6272 MB/s Dec 13 14:04:56.829692 kernel: raid6: int64x8 xor() 3544 MB/s Dec 13 14:04:56.849691 kernel: raid6: int64x4 gen() 7202 MB/s Dec 13 14:04:56.869690 kernel: raid6: int64x4 xor() 3854 MB/s Dec 13 14:04:56.890692 kernel: raid6: int64x2 gen() 6155 MB/s Dec 13 14:04:56.910691 kernel: raid6: int64x2 xor() 3319 MB/s Dec 13 14:04:56.930694 kernel: raid6: int64x1 gen() 5044 MB/s Dec 13 14:04:56.955983 kernel: raid6: int64x1 xor() 2645 MB/s Dec 13 14:04:56.955994 kernel: raid6: using algorithm neonx8 gen() 13812 MB/s Dec 13 14:04:56.956002 kernel: raid6: .... xor() 10835 MB/s, rmw enabled Dec 13 14:04:56.960331 kernel: raid6: using neon recovery algorithm Dec 13 14:04:56.981354 kernel: xor: measuring software checksum speed Dec 13 14:04:56.981367 kernel: 8regs : 17191 MB/sec Dec 13 14:04:56.985212 kernel: 32regs : 20676 MB/sec Dec 13 14:04:56.989227 kernel: arm64_neon : 27794 MB/sec Dec 13 14:04:56.989236 kernel: xor: using function: arm64_neon (27794 MB/sec) Dec 13 14:04:57.050703 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:04:57.060305 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:04:57.069716 systemd[1]: Starting systemd-udevd.service... Dec 13 14:04:57.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:57.068000 audit: BPF prog-id=7 op=LOAD Dec 13 14:04:57.068000 audit: BPF prog-id=8 op=LOAD Dec 13 14:04:57.084459 systemd-udevd[476]: Using default interface naming scheme 'v252'. Dec 13 14:04:57.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:57.089883 systemd[1]: Started systemd-udevd.service. Dec 13 14:04:57.101137 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:04:57.116015 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Dec 13 14:04:57.144360 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:04:57.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:57.150047 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:04:57.186969 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:04:57.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:57.244719 kernel: hv_vmbus: Vmbus version:5.3 Dec 13 14:04:57.259710 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:04:57.259757 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:04:57.267936 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Dec 13 14:04:57.267989 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Dec 13 14:04:57.289623 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:04:57.298707 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:04:57.305500 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:04:57.311705 kernel: scsi host0: storvsc_host_t Dec 13 14:04:57.311882 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:04:57.321849 kernel: scsi host1: storvsc_host_t Dec 13 14:04:57.329708 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:04:57.348736 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:04:57.371136 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:04:57.371152 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:04:57.381426 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:04:57.381541 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:04:57.381625 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:04:57.381743 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:04:57.387855 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:04:57.387967 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:04:57.388000 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:04:57.388094 kernel: hv_netvsc 000d3ac5-2cc3-000d-3ac5-2cc3000d3ac5 eth0: VF slot 1 added Dec 13 14:04:57.399719 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:04:57.413304 kernel: hv_pci 8f86b69a-4adf-4267-8152-658ce5d1d801: PCI VMBus probing: Using version 0x10004 Dec 13 14:04:57.563040 kernel: hv_pci 8f86b69a-4adf-4267-8152-658ce5d1d801: PCI host bridge to bus 4adf:00 Dec 13 14:04:57.563146 kernel: pci_bus 4adf:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Dec 13 14:04:57.563247 kernel: pci_bus 4adf:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:04:57.563327 kernel: pci 4adf:00:02.0: [15b3:1018] type 00 class 0x020000 Dec 13 14:04:57.563423 kernel: pci 4adf:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:04:57.563504 kernel: pci 4adf:00:02.0: enabling Extended Tags Dec 13 14:04:57.563591 kernel: pci 4adf:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 4adf:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Dec 13 14:04:57.563671 kernel: pci_bus 4adf:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:04:57.563772 kernel: pci 4adf:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:04:57.600715 kernel: mlx5_core 4adf:00:02.0: firmware version: 16.30.1284 Dec 13 14:04:57.820930 kernel: mlx5_core 4adf:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Dec 13 14:04:57.821097 kernel: hv_netvsc 000d3ac5-2cc3-000d-3ac5-2cc3000d3ac5 eth0: VF registering: eth1 Dec 13 14:04:57.821193 kernel: mlx5_core 4adf:00:02.0 eth1: joined to eth0 Dec 13 14:04:57.828735 kernel: mlx5_core 4adf:00:02.0 enP19167s1: renamed from eth1 Dec 13 14:04:57.913079 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:04:57.976729 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (540) Dec 13 14:04:57.989438 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:04:58.199230 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:04:58.217643 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:04:58.225857 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:04:58.240532 systemd[1]: Starting disk-uuid.service... Dec 13 14:04:58.261715 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:04:58.280717 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:04:59.280706 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:04:59.281249 disk-uuid[604]: The operation has completed successfully. Dec 13 14:04:59.342496 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:04:59.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.346000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.342590 systemd[1]: Finished disk-uuid.service. Dec 13 14:04:59.352167 systemd[1]: Starting verity-setup.service... Dec 13 14:04:59.398707 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:04:59.613659 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:04:59.623459 systemd[1]: Finished verity-setup.service. Dec 13 14:04:59.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.629334 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:04:59.690698 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:04:59.690937 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:04:59.695117 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:04:59.695957 systemd[1]: Starting ignition-setup.service... Dec 13 14:04:59.704471 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:04:59.749172 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:04:59.749232 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:04:59.749247 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:04:59.799697 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:04:59.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.808000 audit: BPF prog-id=9 op=LOAD Dec 13 14:04:59.810888 systemd[1]: Starting systemd-networkd.service... Dec 13 14:04:59.840080 systemd-networkd[868]: lo: Link UP Dec 13 14:04:59.840097 systemd-networkd[868]: lo: Gained carrier Dec 13 14:04:59.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.840516 systemd-networkd[868]: Enumeration completed Dec 13 14:04:59.844284 systemd[1]: Started systemd-networkd.service. Dec 13 14:04:59.845842 systemd-networkd[868]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:04:59.849813 systemd[1]: Reached target network.target. Dec 13 14:04:59.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.862816 systemd[1]: Starting iscsiuio.service... Dec 13 14:04:59.895343 iscsid[880]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:04:59.895343 iscsid[880]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:04:59.895343 iscsid[880]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:04:59.895343 iscsid[880]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:04:59.895343 iscsid[880]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:04:59.895343 iscsid[880]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:04:59.895343 iscsid[880]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:04:59.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.972000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.875207 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:04:59.875558 systemd[1]: Started iscsiuio.service. Dec 13 14:04:59.890166 systemd[1]: Starting iscsid.service... Dec 13 14:04:59.898784 systemd[1]: Started iscsid.service. Dec 13 14:04:59.928611 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:04:59.963228 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:05:00.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.972943 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:05:00.059100 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 14:05:00.059121 kernel: audit: type=1130 audit(1734098700.029:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:04:59.984118 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:04:59.994739 systemd[1]: Reached target remote-fs.target. Dec 13 14:05:00.006444 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:05:00.095726 kernel: audit: type=1130 audit(1734098700.072:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:00.072000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:00.025142 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:05:00.067769 systemd[1]: Finished ignition-setup.service. Dec 13 14:05:00.108633 kernel: mlx5_core 4adf:00:02.0 enP19167s1: Link up Dec 13 14:05:00.073295 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:05:00.151871 kernel: hv_netvsc 000d3ac5-2cc3-000d-3ac5-2cc3000d3ac5 eth0: Data path switched to VF: enP19167s1 Dec 13 14:05:00.152069 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:05:00.152771 systemd-networkd[868]: enP19167s1: Link UP Dec 13 14:05:00.152963 systemd-networkd[868]: eth0: Link UP Dec 13 14:05:00.153311 systemd-networkd[868]: eth0: Gained carrier Dec 13 14:05:00.161147 systemd-networkd[868]: enP19167s1: Gained carrier Dec 13 14:05:00.170754 systemd-networkd[868]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:05:01.383939 systemd-networkd[868]: eth0: Gained IPv6LL Dec 13 14:05:02.650424 ignition[895]: Ignition 2.14.0 Dec 13 14:05:02.650436 ignition[895]: Stage: fetch-offline Dec 13 14:05:02.650492 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:02.650515 ignition[895]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:02.717125 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:02.717282 ignition[895]: parsed url from cmdline: "" Dec 13 14:05:02.717285 ignition[895]: no config URL provided Dec 13 14:05:02.717290 ignition[895]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:05:02.767130 kernel: audit: type=1130 audit(1734098702.739:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.731291 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:05:02.717299 ignition[895]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:05:02.741307 systemd[1]: Starting ignition-fetch.service... Dec 13 14:05:02.717305 ignition[895]: failed to fetch config: resource requires networking Dec 13 14:05:02.717633 ignition[895]: Ignition finished successfully Dec 13 14:05:02.771276 ignition[902]: Ignition 2.14.0 Dec 13 14:05:02.771283 ignition[902]: Stage: fetch Dec 13 14:05:02.771415 ignition[902]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:02.771436 ignition[902]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:02.780759 ignition[902]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:02.781052 ignition[902]: parsed url from cmdline: "" Dec 13 14:05:02.781056 ignition[902]: no config URL provided Dec 13 14:05:02.781077 ignition[902]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:05:02.781088 ignition[902]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:05:02.781125 ignition[902]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:05:02.909427 ignition[902]: GET result: OK Dec 13 14:05:02.909524 ignition[902]: config has been read from IMDS userdata Dec 13 14:05:02.909579 ignition[902]: parsing config with SHA512: 5c7b44ede919fdf355299cd143203ffbc7ddeb42bb3cf21e1e6ac2691937664fdae6de304c009800a31b6273886f101e5ca5c40cc1fdd2dfaaba6279ba9e8a99 Dec 13 14:05:02.913340 unknown[902]: fetched base config from "system" Dec 13 14:05:02.913932 ignition[902]: fetch: fetch complete Dec 13 14:05:02.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.913359 unknown[902]: fetched base config from "system" Dec 13 14:05:02.962067 kernel: audit: type=1130 audit(1734098702.929:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.913937 ignition[902]: fetch: fetch passed Dec 13 14:05:02.913366 unknown[902]: fetched user config from "azure" Dec 13 14:05:02.914002 ignition[902]: Ignition finished successfully Dec 13 14:05:02.919195 systemd[1]: Finished ignition-fetch.service. Dec 13 14:05:02.965405 ignition[908]: Ignition 2.14.0 Dec 13 14:05:03.011047 kernel: audit: type=1130 audit(1734098702.984:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.952211 systemd[1]: Starting ignition-kargs.service... Dec 13 14:05:02.965411 ignition[908]: Stage: kargs Dec 13 14:05:03.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.979797 systemd[1]: Finished ignition-kargs.service. Dec 13 14:05:03.055307 kernel: audit: type=1130 audit(1734098703.021:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:02.965531 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:02.985943 systemd[1]: Starting ignition-disks.service... Dec 13 14:05:02.965552 ignition[908]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:03.011958 systemd[1]: Finished ignition-disks.service. Dec 13 14:05:02.968552 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:03.043210 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:05:02.974533 ignition[908]: kargs: kargs passed Dec 13 14:05:03.050068 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:05:02.974612 ignition[908]: Ignition finished successfully Dec 13 14:05:03.060841 systemd[1]: Reached target local-fs.target. Dec 13 14:05:02.995495 ignition[914]: Ignition 2.14.0 Dec 13 14:05:03.073445 systemd[1]: Reached target sysinit.target. Dec 13 14:05:02.995502 ignition[914]: Stage: disks Dec 13 14:05:03.083588 systemd[1]: Reached target basic.target. Dec 13 14:05:02.995649 ignition[914]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:03.094538 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:05:02.995672 ignition[914]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:02.998767 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:03.010195 ignition[914]: disks: disks passed Dec 13 14:05:03.010248 ignition[914]: Ignition finished successfully Dec 13 14:05:03.187366 systemd-fsck[922]: ROOT: clean, 621/7326000 files, 481076/7359488 blocks Dec 13 14:05:03.200973 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:05:03.232764 kernel: audit: type=1130 audit(1734098703.205:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:03.205000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:03.209373 systemd[1]: Mounting sysroot.mount... Dec 13 14:05:03.251697 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:05:03.251963 systemd[1]: Mounted sysroot.mount. Dec 13 14:05:03.256441 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:05:03.310323 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:05:03.315509 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:05:03.329547 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:05:03.329593 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:05:03.345736 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:05:03.399573 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:05:03.405009 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:05:03.438162 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (933) Dec 13 14:05:03.438225 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:03.438236 initrd-setup-root[938]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:05:03.450172 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:03.456129 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:03.460273 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:05:03.472150 initrd-setup-root[964]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:05:03.496641 initrd-setup-root[972]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:05:03.506962 initrd-setup-root[980]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:05:03.947406 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:05:03.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:03.953483 systemd[1]: Starting ignition-mount.service... Dec 13 14:05:03.984450 kernel: audit: type=1130 audit(1734098703.952:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:03.984739 systemd[1]: Starting sysroot-boot.service... Dec 13 14:05:03.990136 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:05:03.990243 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:05:04.023936 systemd[1]: Finished sysroot-boot.service. Dec 13 14:05:04.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:04.055716 kernel: audit: type=1130 audit(1734098704.028:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:04.162571 ignition[1002]: INFO : Ignition 2.14.0 Dec 13 14:05:04.169708 ignition[1002]: INFO : Stage: mount Dec 13 14:05:04.169708 ignition[1002]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:04.169708 ignition[1002]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:04.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:04.223370 ignition[1002]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:04.223370 ignition[1002]: INFO : mount: mount passed Dec 13 14:05:04.223370 ignition[1002]: INFO : Ignition finished successfully Dec 13 14:05:04.245146 kernel: audit: type=1130 audit(1734098704.187:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:04.182846 systemd[1]: Finished ignition-mount.service. Dec 13 14:05:04.648884 coreos-metadata[932]: Dec 13 14:05:04.648 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:05:04.659211 coreos-metadata[932]: Dec 13 14:05:04.652 INFO Fetch successful Dec 13 14:05:04.685441 coreos-metadata[932]: Dec 13 14:05:04.685 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:05:04.700481 coreos-metadata[932]: Dec 13 14:05:04.700 INFO Fetch successful Dec 13 14:05:04.717172 coreos-metadata[932]: Dec 13 14:05:04.717 INFO wrote hostname ci-3510.3.6-a-1df240c4f3 to /sysroot/etc/hostname Dec 13 14:05:04.728191 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:05:04.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:04.735275 systemd[1]: Starting ignition-files.service... Dec 13 14:05:04.753158 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:05:04.775727 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) Dec 13 14:05:04.789225 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:04.789289 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:04.789300 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:04.799750 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:05:04.818748 ignition[1030]: INFO : Ignition 2.14.0 Dec 13 14:05:04.818748 ignition[1030]: INFO : Stage: files Dec 13 14:05:04.832420 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:04.832420 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:04.832420 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:04.832420 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:05:04.832420 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:05:04.832420 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:05:04.950422 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:05:04.958717 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:05:04.967298 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:05:04.966135 unknown[1030]: wrote ssh authorized keys file for user: core Dec 13 14:05:04.992835 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:05:05.005056 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:05:05.038864 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:05:05.229814 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:05:05.241656 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:05:05.418473 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1030) Dec 13 14:05:05.280725 systemd[1]: mnt-oem2637118247.mount: Deactivated successfully. Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637118247" Dec 13 14:05:05.424465 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637118247": device or resource busy Dec 13 14:05:05.424465 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2637118247", trying btrfs: device or resource busy Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637118247" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2637118247" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem2637118247" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem2637118247" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939048578" Dec 13 14:05:05.424465 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939048578": device or resource busy Dec 13 14:05:05.424465 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3939048578", trying btrfs: device or resource busy Dec 13 14:05:05.424465 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939048578" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3939048578" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem3939048578" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem3939048578" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:05:05.595733 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-arm64.raw: attempt #1 Dec 13 14:05:05.825002 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 14:05:06.051097 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-arm64.raw" Dec 13 14:05:06.051097 ignition[1030]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 14:05:06.051097 ignition[1030]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 14:05:06.051097 ignition[1030]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 14:05:06.051097 ignition[1030]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 14:05:06.135841 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:05:06.135865 kernel: audit: type=1130 audit(1734098706.070:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.070000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:05:06.135945 ignition[1030]: INFO : files: files passed Dec 13 14:05:06.135945 ignition[1030]: INFO : Ignition finished successfully Dec 13 14:05:06.391753 kernel: audit: type=1130 audit(1734098706.141:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.392162 kernel: audit: type=1130 audit(1734098706.187:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.392178 kernel: audit: type=1131 audit(1734098706.187:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.392190 kernel: audit: type=1130 audit(1734098706.294:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.392205 kernel: audit: type=1131 audit(1734098706.319:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.187000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.065457 systemd[1]: Finished ignition-files.service. Dec 13 14:05:06.074000 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:05:06.404833 initrd-setup-root-after-ignition[1054]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:05:06.440770 kernel: audit: type=1130 audit(1734098706.409:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.106405 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:05:06.107286 systemd[1]: Starting ignition-quench.service... Dec 13 14:05:06.121073 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:05:06.170768 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:05:06.170871 systemd[1]: Finished ignition-quench.service. Dec 13 14:05:06.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.513707 kernel: audit: type=1131 audit(1734098706.489:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.187553 systemd[1]: Reached target ignition-complete.target. Dec 13 14:05:06.250217 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:05:06.283355 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:05:06.283482 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:05:06.320002 systemd[1]: Reached target initrd-fs.target. Dec 13 14:05:06.332457 systemd[1]: Reached target initrd.target. Dec 13 14:05:06.364091 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:05:06.364975 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:05:06.404735 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:05:06.410675 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:05:06.450165 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:05:06.457658 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:05:06.652729 kernel: audit: type=1131 audit(1734098706.625:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.468724 systemd[1]: Stopped target timers.target. Dec 13 14:05:06.479005 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:05:06.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.479070 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:05:06.700248 kernel: audit: type=1131 audit(1734098706.657:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.695000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.489710 systemd[1]: Stopped target initrd.target. Dec 13 14:05:06.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.515583 systemd[1]: Stopped target basic.target. Dec 13 14:05:06.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.525428 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:05:06.535336 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:05:06.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.751534 ignition[1068]: INFO : Ignition 2.14.0 Dec 13 14:05:06.751534 ignition[1068]: INFO : Stage: umount Dec 13 14:05:06.751534 ignition[1068]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:05:06.751534 ignition[1068]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:05:06.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.545942 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:05:06.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.812633 ignition[1068]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:05:06.812633 ignition[1068]: INFO : umount: umount passed Dec 13 14:05:06.812633 ignition[1068]: INFO : Ignition finished successfully Dec 13 14:05:06.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.555611 systemd[1]: Stopped target remote-fs.target. Dec 13 14:05:06.564467 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:05:06.574473 systemd[1]: Stopped target sysinit.target. Dec 13 14:05:06.586514 systemd[1]: Stopped target local-fs.target. Dec 13 14:05:06.595872 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:05:06.605642 systemd[1]: Stopped target swap.target. Dec 13 14:05:06.615021 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:05:06.615092 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:05:06.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.625832 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:05:06.653116 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:05:06.653177 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:05:06.658191 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:05:06.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.658233 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:05:06.684819 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:05:06.970000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.970000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:05:06.684865 systemd[1]: Stopped ignition-files.service. Dec 13 14:05:06.695567 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:05:06.994000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.695612 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:05:07.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.706487 systemd[1]: Stopping ignition-mount.service... Dec 13 14:05:07.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.714910 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:05:06.714982 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:05:07.037000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.725786 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:05:06.738598 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:05:06.738691 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:05:07.067000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.746054 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:05:07.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.746123 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:05:07.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.757555 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:05:07.108840 kernel: hv_netvsc 000d3ac5-2cc3-000d-3ac5-2cc3000d3ac5 eth0: Data path switched from VF: enP19167s1 Dec 13 14:05:06.757645 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:05:06.768079 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:05:07.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.768182 systemd[1]: Stopped ignition-mount.service. Dec 13 14:05:07.134000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.777365 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:05:07.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:07.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.777425 systemd[1]: Stopped ignition-disks.service. Dec 13 14:05:07.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.805939 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:05:06.805999 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:05:06.818744 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:05:06.818800 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:05:06.823438 systemd[1]: Stopped target network.target. Dec 13 14:05:06.835462 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:05:06.835530 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:05:06.844430 systemd[1]: Stopped target paths.target. Dec 13 14:05:06.853741 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:05:06.862472 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:05:06.868816 systemd[1]: Stopped target slices.target. Dec 13 14:05:06.881940 systemd[1]: Stopped target sockets.target. Dec 13 14:05:07.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:06.890307 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:05:06.890343 systemd[1]: Closed iscsid.socket. Dec 13 14:05:06.900313 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:05:06.900451 systemd[1]: Closed iscsiuio.socket. Dec 13 14:05:06.908903 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:05:06.908968 systemd[1]: Stopped ignition-setup.service. Dec 13 14:05:06.920916 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:05:06.929225 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:05:07.292910 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Dec 13 14:05:07.292948 iscsid[880]: iscsid shutting down. Dec 13 14:05:06.937733 systemd-networkd[868]: eth0: DHCPv6 lease lost Dec 13 14:05:07.292000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:05:06.939848 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:05:06.944104 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:05:06.944214 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:05:06.953658 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:05:06.953775 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:05:06.971056 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:05:06.971096 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:05:06.981143 systemd[1]: Stopping network-cleanup.service... Dec 13 14:05:06.989623 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:05:06.989712 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:05:06.995221 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:05:06.995274 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:05:07.011326 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:05:07.011390 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:05:07.017735 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:05:07.027349 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:05:07.033034 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:05:07.033190 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:05:07.038584 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:05:07.038627 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:05:07.047805 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:05:07.047847 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:05:07.056065 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:05:07.056123 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:05:07.067804 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:05:07.067848 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:05:07.078040 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:05:07.078088 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:05:07.103000 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:05:07.118406 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:05:07.118485 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:05:07.124026 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:05:07.124136 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:05:07.134604 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:05:07.134715 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:05:07.143862 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:05:07.143919 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:05:07.214442 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:05:07.214578 systemd[1]: Stopped network-cleanup.service. Dec 13 14:05:07.224894 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:05:07.236844 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:05:07.257871 systemd[1]: Switching root. Dec 13 14:05:07.294131 systemd-journald[276]: Journal stopped Dec 13 14:05:18.806771 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:05:18.806797 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:05:18.806808 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:05:18.806820 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:05:18.806828 kernel: SELinux: policy capability open_perms=1 Dec 13 14:05:18.806836 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:05:18.806846 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:05:18.806855 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:05:18.806863 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:05:18.806872 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:05:18.806943 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:05:18.806958 systemd[1]: Successfully loaded SELinux policy in 255.036ms. Dec 13 14:05:18.806969 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.322ms. Dec 13 14:05:18.806984 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:05:18.806994 systemd[1]: Detected virtualization microsoft. Dec 13 14:05:18.807005 systemd[1]: Detected architecture arm64. Dec 13 14:05:18.807014 systemd[1]: Detected first boot. Dec 13 14:05:18.807024 systemd[1]: Hostname set to . Dec 13 14:05:18.807034 systemd[1]: Initializing machine ID from random generator. Dec 13 14:05:18.807043 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:05:18.807079 kernel: kauditd_printk_skb: 38 callbacks suppressed Dec 13 14:05:18.807091 kernel: audit: type=1400 audit(1734098711.611:86): avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:05:18.807146 kernel: audit: type=1300 audit(1734098711.611:86): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:18.807159 kernel: audit: type=1327 audit(1734098711.611:86): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:18.807169 kernel: audit: type=1400 audit(1734098711.624:87): avc: denied { associate } for pid=1101 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:05:18.807179 kernel: audit: type=1300 audit(1734098711.624:87): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:18.807187 kernel: audit: type=1307 audit(1734098711.624:87): cwd="/" Dec 13 14:05:18.807198 kernel: audit: type=1302 audit(1734098711.624:87): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:18.807207 kernel: audit: type=1302 audit(1734098711.624:87): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:18.807217 kernel: audit: type=1327 audit(1734098711.624:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:18.807227 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:05:18.807237 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:05:18.807247 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:05:18.807258 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:05:18.807271 kernel: audit: type=1334 audit(1734098717.962:88): prog-id=12 op=LOAD Dec 13 14:05:18.807279 kernel: audit: type=1334 audit(1734098717.962:89): prog-id=3 op=UNLOAD Dec 13 14:05:18.807288 kernel: audit: type=1334 audit(1734098717.970:90): prog-id=13 op=LOAD Dec 13 14:05:18.807297 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:05:18.807307 kernel: audit: type=1334 audit(1734098717.977:91): prog-id=14 op=LOAD Dec 13 14:05:18.807316 systemd[1]: Stopped iscsiuio.service. Dec 13 14:05:18.807327 kernel: audit: type=1334 audit(1734098717.977:92): prog-id=4 op=UNLOAD Dec 13 14:05:18.807338 kernel: audit: type=1334 audit(1734098717.977:93): prog-id=5 op=UNLOAD Dec 13 14:05:18.807348 kernel: audit: type=1131 audit(1734098717.978:94): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.807357 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:05:18.807366 kernel: audit: type=1334 audit(1734098718.001:95): prog-id=12 op=UNLOAD Dec 13 14:05:18.807376 systemd[1]: Stopped iscsid.service. Dec 13 14:05:18.807386 kernel: audit: type=1131 audit(1734098718.035:96): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.807395 kernel: audit: type=1131 audit(1734098718.078:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.807405 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:05:18.807415 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:05:18.807425 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:05:18.807435 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:05:18.807445 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:05:18.807455 systemd[1]: Created slice system-getty.slice. Dec 13 14:05:18.807464 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:05:18.807476 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:05:18.807485 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:05:18.807495 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:05:18.807505 systemd[1]: Created slice user.slice. Dec 13 14:05:18.807515 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:05:18.807525 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:05:18.807534 systemd[1]: Set up automount boot.automount. Dec 13 14:05:18.807544 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:05:18.807554 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:05:18.807563 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:05:18.807574 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:05:18.807584 systemd[1]: Reached target integritysetup.target. Dec 13 14:05:18.807593 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:05:18.807603 systemd[1]: Reached target remote-fs.target. Dec 13 14:05:18.807612 systemd[1]: Reached target slices.target. Dec 13 14:05:18.807622 systemd[1]: Reached target swap.target. Dec 13 14:05:18.807631 systemd[1]: Reached target torcx.target. Dec 13 14:05:18.807642 systemd[1]: Reached target veritysetup.target. Dec 13 14:05:18.807652 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:05:18.807662 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:05:18.807672 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:05:18.807700 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:05:18.807963 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:05:18.807984 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:05:18.808000 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:05:18.808010 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:05:18.808020 systemd[1]: Mounting media.mount... Dec 13 14:05:18.808030 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:05:18.808040 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:05:18.808050 systemd[1]: Mounting tmp.mount... Dec 13 14:05:18.808060 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:05:18.808070 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:05:18.808080 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:05:18.808091 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:05:18.808100 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:05:18.808110 systemd[1]: Starting modprobe@drm.service... Dec 13 14:05:18.808120 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:05:18.808129 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:05:18.808140 systemd[1]: Starting modprobe@loop.service... Dec 13 14:05:18.808151 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:05:18.808161 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:05:18.808171 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:05:18.808185 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:05:18.808195 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:05:18.808205 kernel: loop: module loaded Dec 13 14:05:18.808215 systemd[1]: Stopped systemd-journald.service. Dec 13 14:05:18.808224 kernel: fuse: init (API version 7.34) Dec 13 14:05:18.808233 systemd[1]: systemd-journald.service: Consumed 3.138s CPU time. Dec 13 14:05:18.808243 systemd[1]: Starting systemd-journald.service... Dec 13 14:05:18.808253 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:05:18.808263 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:05:18.808274 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:05:18.808284 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:05:18.808294 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:05:18.808304 systemd[1]: Stopped verity-setup.service. Dec 13 14:05:18.808314 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:05:18.808324 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:05:18.808333 systemd[1]: Mounted media.mount. Dec 13 14:05:18.808343 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:05:18.808353 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:05:18.808365 systemd[1]: Mounted tmp.mount. Dec 13 14:05:18.808379 systemd-journald[1208]: Journal started Dec 13 14:05:18.808442 systemd-journald[1208]: Runtime Journal (/run/log/journal/b8eeb671a9564ac48c7aba37d349a0e8) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:05:09.619000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:05:10.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:05:10.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:05:10.351000 audit: BPF prog-id=10 op=LOAD Dec 13 14:05:10.351000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:05:10.351000 audit: BPF prog-id=11 op=LOAD Dec 13 14:05:10.351000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:05:11.611000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:05:11.611000 audit[1101]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:11.611000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:11.624000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:05:11.624000 audit[1101]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:11.624000 audit: CWD cwd="/" Dec 13 14:05:11.624000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:11.624000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:11.624000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:05:17.962000 audit: BPF prog-id=12 op=LOAD Dec 13 14:05:17.962000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:05:17.970000 audit: BPF prog-id=13 op=LOAD Dec 13 14:05:17.977000 audit: BPF prog-id=14 op=LOAD Dec 13 14:05:17.977000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:05:17.977000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:05:17.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.001000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:05:18.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.655000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.676000 audit: BPF prog-id=15 op=LOAD Dec 13 14:05:18.676000 audit: BPF prog-id=16 op=LOAD Dec 13 14:05:18.676000 audit: BPF prog-id=17 op=LOAD Dec 13 14:05:18.676000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:05:18.676000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:05:18.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.803000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:05:18.803000 audit[1208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=4 a1=fffff3236570 a2=4000 a3=1 items=0 ppid=1 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:18.803000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:05:17.961481 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:05:11.581134 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:05:17.978940 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:05:11.581433 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:05:17.979319 systemd[1]: systemd-journald.service: Consumed 3.138s CPU time. Dec 13 14:05:11.581451 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:05:11.581491 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:05:11.581500 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:05:11.581530 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:05:11.581542 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:05:11.581785 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:05:11.581821 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:05:11.581833 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:05:11.597495 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:05:11.597536 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:05:11.597556 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:05:11.597570 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:05:11.597589 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:05:11.597603 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:11Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:05:16.971143 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:16.971412 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:16.971520 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:16.971697 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:05:16.971759 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:05:16.971816 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-12-13T14:05:16Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:05:18.822651 systemd[1]: Started systemd-journald.service. Dec 13 14:05:18.822000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.823799 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:05:18.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.830014 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:05:18.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.835997 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:05:18.836141 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:05:18.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.841432 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:05:18.841547 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:05:18.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.845000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.846475 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:05:18.846607 systemd[1]: Finished modprobe@drm.service. Dec 13 14:05:18.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.851238 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:05:18.851364 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:05:18.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.856000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.857202 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:05:18.857334 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:05:18.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.862376 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:05:18.862512 systemd[1]: Finished modprobe@loop.service. Dec 13 14:05:18.866000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.867737 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:05:18.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.873419 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:05:18.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.879532 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:05:18.886044 systemd[1]: Reached target network-pre.target. Dec 13 14:05:18.892852 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:05:18.898882 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:05:18.903408 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:05:18.905273 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:05:18.911671 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:05:18.917178 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:05:18.918469 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:05:18.923723 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:05:18.925020 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:05:18.930809 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:05:18.939398 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:05:18.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.945843 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:05:18.951551 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:05:18.960613 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:05:18.971758 udevadm[1222]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 14:05:18.973594 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:05:18.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:18.984542 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:05:18.997256 systemd-journald[1208]: Time spent on flushing to /var/log/journal/b8eeb671a9564ac48c7aba37d349a0e8 is 14.134ms for 1093 entries. Dec 13 14:05:18.997256 systemd-journald[1208]: System Journal (/var/log/journal/b8eeb671a9564ac48c7aba37d349a0e8) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:05:19.056907 systemd-journald[1208]: Received client request to flush runtime journal. Dec 13 14:05:19.057889 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:05:19.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:19.084051 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:05:19.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:19.454828 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:05:19.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:19.938733 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:05:19.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:19.944000 audit: BPF prog-id=18 op=LOAD Dec 13 14:05:19.944000 audit: BPF prog-id=19 op=LOAD Dec 13 14:05:19.944000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:05:19.944000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:05:19.945898 systemd[1]: Starting systemd-udevd.service... Dec 13 14:05:19.964930 systemd-udevd[1225]: Using default interface naming scheme 'v252'. Dec 13 14:05:20.145203 systemd[1]: Started systemd-udevd.service. Dec 13 14:05:20.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:20.154000 audit: BPF prog-id=20 op=LOAD Dec 13 14:05:20.157911 systemd[1]: Starting systemd-networkd.service... Dec 13 14:05:20.187220 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:05:20.224001 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:05:20.222000 audit: BPF prog-id=21 op=LOAD Dec 13 14:05:20.222000 audit: BPF prog-id=22 op=LOAD Dec 13 14:05:20.222000 audit: BPF prog-id=23 op=LOAD Dec 13 14:05:20.270720 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:05:20.280000 audit[1237]: AVC avc: denied { confidentiality } for pid=1237 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:05:20.291606 systemd[1]: Started systemd-userdbd.service. Dec 13 14:05:20.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:20.308728 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:05:20.308825 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:05:20.309738 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:05:20.326294 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:05:20.326385 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:05:20.326400 kernel: hv_balloon: Memory hot add disabled on ARM64 Dec 13 14:05:20.335609 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:05:20.335657 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:05:20.353242 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:05:20.353340 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:05:20.353381 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:05:20.353403 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:05:20.814331 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:05:20.280000 audit[1237]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaad1ff5ce0 a1=aa2c a2=ffff9b5624b0 a3=aaaad1f52010 items=12 ppid=1225 pid=1237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:20.280000 audit: CWD cwd="/" Dec 13 14:05:20.280000 audit: PATH item=0 name=(null) inode=7220 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=1 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=2 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=3 name=(null) inode=11403 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=4 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=5 name=(null) inode=11404 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=6 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=7 name=(null) inode=11405 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=8 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=9 name=(null) inode=11406 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=10 name=(null) inode=11402 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PATH item=11 name=(null) inode=11407 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:05:20.280000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:05:20.987332 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1229) Dec 13 14:05:21.010914 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:05:21.020774 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:05:21.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.028031 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:05:21.055815 systemd-networkd[1246]: lo: Link UP Dec 13 14:05:21.056099 systemd-networkd[1246]: lo: Gained carrier Dec 13 14:05:21.056762 systemd-networkd[1246]: Enumeration completed Dec 13 14:05:21.057003 systemd[1]: Started systemd-networkd.service. Dec 13 14:05:21.061000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.064428 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:05:21.086277 systemd-networkd[1246]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:05:21.137305 kernel: mlx5_core 4adf:00:02.0 enP19167s1: Link up Dec 13 14:05:21.165303 kernel: hv_netvsc 000d3ac5-2cc3-000d-3ac5-2cc3000d3ac5 eth0: Data path switched to VF: enP19167s1 Dec 13 14:05:21.165880 systemd-networkd[1246]: enP19167s1: Link UP Dec 13 14:05:21.165983 systemd-networkd[1246]: eth0: Link UP Dec 13 14:05:21.165986 systemd-networkd[1246]: eth0: Gained carrier Dec 13 14:05:21.169600 systemd-networkd[1246]: enP19167s1: Gained carrier Dec 13 14:05:21.185420 systemd-networkd[1246]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:05:21.272342 lvm[1302]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:05:21.294260 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:05:21.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.300105 systemd[1]: Reached target cryptsetup.target. Dec 13 14:05:21.306475 systemd[1]: Starting lvm2-activation.service... Dec 13 14:05:21.311437 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:05:21.328181 systemd[1]: Finished lvm2-activation.service. Dec 13 14:05:21.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.333639 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:05:21.339008 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:05:21.339136 systemd[1]: Reached target local-fs.target. Dec 13 14:05:21.344074 systemd[1]: Reached target machines.target. Dec 13 14:05:21.350468 systemd[1]: Starting ldconfig.service... Dec 13 14:05:21.355240 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:05:21.355453 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:21.356816 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:05:21.363167 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:05:21.370752 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:05:21.377224 systemd[1]: Starting systemd-sysext.service... Dec 13 14:05:21.408628 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1306 (bootctl) Dec 13 14:05:21.410108 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:05:21.672609 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:05:21.735806 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:05:21.736003 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:05:21.753666 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:05:21.754351 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:05:21.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.773016 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:05:21.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.819305 kernel: loop0: detected capacity change from 0 to 194096 Dec 13 14:05:21.862313 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:05:21.882315 kernel: loop1: detected capacity change from 0 to 194096 Dec 13 14:05:21.886864 (sd-sysext)[1319]: Using extensions 'kubernetes'. Dec 13 14:05:21.887968 (sd-sysext)[1319]: Merged extensions into '/usr'. Dec 13 14:05:21.905574 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:05:21.911293 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:05:21.912801 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:05:21.918717 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:05:21.926020 systemd[1]: Starting modprobe@loop.service... Dec 13 14:05:21.930604 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:05:21.930766 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:21.933236 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:05:21.938202 systemd-fsck[1316]: fsck.fat 4.2 (2021-01-31) Dec 13 14:05:21.938202 systemd-fsck[1316]: /dev/sda1: 236 files, 117175/258078 clusters Dec 13 14:05:21.939807 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:05:21.939938 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:05:21.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.945906 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:05:21.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.953771 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:05:21.953917 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:05:21.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.960388 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:05:21.960523 systemd[1]: Finished modprobe@loop.service. Dec 13 14:05:21.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.967538 systemd[1]: Mounting boot.mount... Dec 13 14:05:21.973294 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:05:21.973367 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:05:21.973808 systemd[1]: Finished systemd-sysext.service. Dec 13 14:05:21.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:21.983055 systemd[1]: Mounted boot.mount. Dec 13 14:05:21.991454 systemd[1]: Starting ensure-sysext.service... Dec 13 14:05:21.997482 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:05:22.005442 systemd[1]: Reloading. Dec 13 14:05:22.089633 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2024-12-13T14:05:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:05:22.090020 /usr/lib/systemd/system-generators/torcx-generator[1350]: time="2024-12-13T14:05:22Z" level=info msg="torcx already run" Dec 13 14:05:22.139840 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:05:22.145440 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:05:22.145461 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:05:22.161295 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:05:22.226000 audit: BPF prog-id=24 op=LOAD Dec 13 14:05:22.226000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:05:22.228935 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:05:22.229000 audit: BPF prog-id=25 op=LOAD Dec 13 14:05:22.229000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:05:22.229000 audit: BPF prog-id=26 op=LOAD Dec 13 14:05:22.229000 audit: BPF prog-id=27 op=LOAD Dec 13 14:05:22.229000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:05:22.229000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:05:22.230000 audit: BPF prog-id=28 op=LOAD Dec 13 14:05:22.230000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:05:22.230000 audit: BPF prog-id=29 op=LOAD Dec 13 14:05:22.230000 audit: BPF prog-id=30 op=LOAD Dec 13 14:05:22.230000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:05:22.230000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:05:22.231000 audit: BPF prog-id=31 op=LOAD Dec 13 14:05:22.231000 audit: BPF prog-id=32 op=LOAD Dec 13 14:05:22.231000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:05:22.231000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:05:22.240711 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:05:22.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.254997 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.256443 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:05:22.262642 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:05:22.269342 systemd[1]: Starting modprobe@loop.service... Dec 13 14:05:22.273720 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.273870 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:22.275445 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:05:22.275617 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:05:22.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.281829 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:05:22.281966 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:05:22.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.293196 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:05:22.293458 systemd[1]: Finished modprobe@loop.service. Dec 13 14:05:22.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.301417 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.302939 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:05:22.310568 systemd-tmpfiles[1330]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:05:22.312660 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:05:22.321104 systemd[1]: Starting modprobe@loop.service... Dec 13 14:05:22.326076 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.326230 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:22.327121 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:05:22.327307 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:05:22.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.332000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.334023 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:05:22.334152 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:05:22.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.340764 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:05:22.340900 systemd[1]: Finished modprobe@loop.service. Dec 13 14:05:22.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.345000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.348897 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.350349 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:05:22.356779 systemd[1]: Starting modprobe@drm.service... Dec 13 14:05:22.363139 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:05:22.369884 systemd[1]: Starting modprobe@loop.service... Dec 13 14:05:22.374546 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.374698 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:22.375704 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:05:22.375858 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:05:22.379000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.381518 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:05:22.381654 systemd[1]: Finished modprobe@drm.service. Dec 13 14:05:22.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.385000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.387189 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:05:22.387487 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:05:22.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.393218 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:05:22.393360 systemd[1]: Finished modprobe@loop.service. Dec 13 14:05:22.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.398945 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:05:22.399026 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:05:22.400264 systemd[1]: Finished ensure-sysext.service. Dec 13 14:05:22.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:22.438464 systemd-networkd[1246]: eth0: Gained IPv6LL Dec 13 14:05:22.444207 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:05:22.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.017923 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:05:23.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.025492 systemd[1]: Starting audit-rules.service... Dec 13 14:05:23.031949 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:05:23.038962 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:05:23.045000 audit: BPF prog-id=33 op=LOAD Dec 13 14:05:23.047491 systemd[1]: Starting systemd-resolved.service... Dec 13 14:05:23.053000 audit: BPF prog-id=34 op=LOAD Dec 13 14:05:23.055964 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:05:23.066585 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:05:23.085000 audit[1426]: SYSTEM_BOOT pid=1426 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.089896 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:05:23.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.102413 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:05:23.108000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.109542 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:05:23.160293 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:05:23.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.168129 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:05:23.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.174863 systemd[1]: Reached target time-set.target. Dec 13 14:05:23.217913 systemd-resolved[1423]: Positive Trust Anchors: Dec 13 14:05:23.218224 systemd-resolved[1423]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:05:23.218336 systemd-resolved[1423]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:05:23.221929 systemd-resolved[1423]: Using system hostname 'ci-3510.3.6-a-1df240c4f3'. Dec 13 14:05:23.223546 systemd[1]: Started systemd-resolved.service. Dec 13 14:05:23.229000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:23.230495 systemd[1]: Reached target network.target. Dec 13 14:05:23.236228 systemd[1]: Reached target network-online.target. Dec 13 14:05:23.242098 systemd[1]: Reached target nss-lookup.target. Dec 13 14:05:23.385000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:05:23.385000 audit[1441]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc2b1e940 a2=420 a3=0 items=0 ppid=1420 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:05:23.385000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:05:23.400543 augenrules[1441]: No rules Dec 13 14:05:23.401579 systemd[1]: Finished audit-rules.service. Dec 13 14:05:23.451930 systemd-timesyncd[1425]: Contacted time server 15.204.87.223:123 (0.flatcar.pool.ntp.org). Dec 13 14:05:23.451997 systemd-timesyncd[1425]: Initial clock synchronization to Fri 2024-12-13 14:05:23.446352 UTC. Dec 13 14:05:28.859503 ldconfig[1305]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:05:28.875023 systemd[1]: Finished ldconfig.service. Dec 13 14:05:28.883701 systemd[1]: Starting systemd-update-done.service... Dec 13 14:05:28.919780 systemd[1]: Finished systemd-update-done.service. Dec 13 14:05:28.927039 systemd[1]: Reached target sysinit.target. Dec 13 14:05:28.933170 systemd[1]: Started motdgen.path. Dec 13 14:05:28.937758 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:05:28.945579 systemd[1]: Started logrotate.timer. Dec 13 14:05:28.950460 systemd[1]: Started mdadm.timer. Dec 13 14:05:28.955434 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:05:28.961903 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:05:28.961942 systemd[1]: Reached target paths.target. Dec 13 14:05:28.968770 systemd[1]: Reached target timers.target. Dec 13 14:05:28.975945 systemd[1]: Listening on dbus.socket. Dec 13 14:05:28.981321 systemd[1]: Starting docker.socket... Dec 13 14:05:28.987403 systemd[1]: Listening on sshd.socket. Dec 13 14:05:28.992041 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:28.992656 systemd[1]: Listening on docker.socket. Dec 13 14:05:28.997070 systemd[1]: Reached target sockets.target. Dec 13 14:05:29.001864 systemd[1]: Reached target basic.target. Dec 13 14:05:29.006225 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:05:29.006253 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:05:29.007453 systemd[1]: Starting containerd.service... Dec 13 14:05:29.012695 systemd[1]: Starting dbus.service... Dec 13 14:05:29.017694 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:05:29.023570 systemd[1]: Starting extend-filesystems.service... Dec 13 14:05:29.028240 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:05:29.029754 systemd[1]: Starting kubelet.service... Dec 13 14:05:29.035143 systemd[1]: Starting motdgen.service... Dec 13 14:05:29.040782 systemd[1]: Started nvidia.service. Dec 13 14:05:29.046643 systemd[1]: Starting prepare-helm.service... Dec 13 14:05:29.053066 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:05:29.059293 systemd[1]: Starting sshd-keygen.service... Dec 13 14:05:29.066095 systemd[1]: Starting systemd-logind.service... Dec 13 14:05:29.084901 jq[1451]: false Dec 13 14:05:29.071632 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:05:29.071708 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:05:29.072222 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:05:29.073033 systemd[1]: Starting update-engine.service... Dec 13 14:05:29.080186 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:05:29.090856 jq[1463]: true Dec 13 14:05:29.096138 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:05:29.097719 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:05:29.106421 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:05:29.106599 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:05:29.152846 jq[1470]: true Dec 13 14:05:29.182881 systemd-logind[1461]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 13 14:05:29.184520 systemd-logind[1461]: New seat seat0. Dec 13 14:05:29.205556 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:05:29.205743 systemd[1]: Finished motdgen.service. Dec 13 14:05:29.230227 extend-filesystems[1452]: Found loop1 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda1 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda2 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda3 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found usr Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda4 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda6 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda7 Dec 13 14:05:29.238713 extend-filesystems[1452]: Found sda9 Dec 13 14:05:29.238713 extend-filesystems[1452]: Checking size of /dev/sda9 Dec 13 14:05:29.418526 bash[1489]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:05:29.418638 tar[1469]: linux-arm64/helm Dec 13 14:05:29.418835 env[1493]: time="2024-12-13T14:05:29.283974975Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:05:29.418835 env[1493]: time="2024-12-13T14:05:29.416605257Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:05:29.418835 env[1493]: time="2024-12-13T14:05:29.416772216Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.322993 dbus-daemon[1450]: [system] SELinux support is enabled Dec 13 14:05:29.312546 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:05:29.419262 extend-filesystems[1452]: Old size kept for /dev/sda9 Dec 13 14:05:29.419262 extend-filesystems[1452]: Found sr0 Dec 13 14:05:29.331785 dbus-daemon[1450]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:05:29.323234 systemd[1]: Started dbus.service. Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428452324Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428495913Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428772644Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428791120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428804597Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428814634Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.428890695Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.429103643Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.429216375Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:05:29.496670 env[1493]: time="2024-12-13T14:05:29.429232011Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:05:29.329224 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.429308112Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.429321868Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451671295Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451716724Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451730360Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451773070Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451788826Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451804662Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.451890641Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.452252871Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.452285183Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.452304058Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.452318135Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497033 env[1493]: time="2024-12-13T14:05:29.452332451Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:05:29.329249 systemd[1]: Reached target system-config.target. Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.452551197Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.452639655Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.452910268Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.452936102Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.452983290Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453035197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453049514Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453061351Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453071668Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453138332Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453173403Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453185040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453196637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453212473Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:05:29.497396 env[1493]: time="2024-12-13T14:05:29.453358117Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.394454 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453376153Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453389030Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453415383Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453431619Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453442176Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453459452Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:05:29.497770 env[1493]: time="2024-12-13T14:05:29.453492764Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:05:29.394473 systemd[1]: Reached target user-config.target. Dec 13 14:05:29.434565 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.453682837Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.453736464Z" level=info msg="Connect containerd service" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.453765576Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454404978Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454569377Z" level=info msg="Start subscribing containerd event" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454652517Z" level=info msg="Start recovering state" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454712742Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454761530Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454763729Z" level=info msg="Start event monitor" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454798201Z" level=info msg="Start snapshots syncer" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454810398Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454804199Z" level=info msg="containerd successfully booted in 0.180665s" Dec 13 14:05:29.498023 env[1493]: time="2024-12-13T14:05:29.454819236Z" level=info msg="Start streaming server" Dec 13 14:05:29.434747 systemd[1]: Finished extend-filesystems.service. Dec 13 14:05:29.472173 systemd[1]: Started containerd.service. Dec 13 14:05:29.501796 systemd[1]: Started systemd-logind.service. Dec 13 14:05:29.523322 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:05:30.052159 tar[1469]: linux-arm64/LICENSE Dec 13 14:05:30.052338 tar[1469]: linux-arm64/README.md Dec 13 14:05:30.057060 systemd[1]: Finished prepare-helm.service. Dec 13 14:05:30.112997 systemd[1]: Started kubelet.service. Dec 13 14:05:30.220603 update_engine[1462]: I1213 14:05:30.203087 1462 main.cc:92] Flatcar Update Engine starting Dec 13 14:05:30.275382 systemd[1]: Started update-engine.service. Dec 13 14:05:30.281702 update_engine[1462]: I1213 14:05:30.281641 1462 update_check_scheduler.cc:74] Next update check in 11m31s Dec 13 14:05:30.285895 systemd[1]: Started locksmithd.service. Dec 13 14:05:30.482239 sshd_keygen[1471]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:05:30.501429 systemd[1]: Finished sshd-keygen.service. Dec 13 14:05:30.507719 systemd[1]: Starting issuegen.service... Dec 13 14:05:30.513312 systemd[1]: Started waagent.service. Dec 13 14:05:30.527687 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:05:30.527872 systemd[1]: Finished issuegen.service. Dec 13 14:05:30.535678 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:05:30.554965 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:05:30.564148 systemd[1]: Started getty@tty1.service. Dec 13 14:05:30.570493 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:05:30.575950 systemd[1]: Reached target getty.target. Dec 13 14:05:30.580524 systemd[1]: Reached target multi-user.target. Dec 13 14:05:30.586648 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:05:30.599409 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:05:30.599568 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:05:30.607070 systemd[1]: Startup finished in 753ms (kernel) + 13.505s (initrd) + 21.011s (userspace) = 35.271s. Dec 13 14:05:30.641917 kubelet[1556]: E1213 14:05:30.641856 1556 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:05:30.644090 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:05:30.644214 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:05:31.311056 login[1576]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:05:31.312136 login[1577]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:05:31.424224 systemd[1]: Created slice user-500.slice. Dec 13 14:05:31.425384 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:05:31.428123 systemd-logind[1461]: New session 1 of user core. Dec 13 14:05:31.430690 systemd-logind[1461]: New session 2 of user core. Dec 13 14:05:31.465926 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:05:31.467403 systemd[1]: Starting user@500.service... Dec 13 14:05:31.504449 (systemd)[1583]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:05:31.549488 locksmithd[1562]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:05:31.694961 systemd[1583]: Queued start job for default target default.target. Dec 13 14:05:31.695486 systemd[1583]: Reached target paths.target. Dec 13 14:05:31.695506 systemd[1583]: Reached target sockets.target. Dec 13 14:05:31.695517 systemd[1583]: Reached target timers.target. Dec 13 14:05:31.695528 systemd[1583]: Reached target basic.target. Dec 13 14:05:31.695628 systemd[1]: Started user@500.service. Dec 13 14:05:31.696516 systemd[1]: Started session-1.scope. Dec 13 14:05:31.697068 systemd[1]: Started session-2.scope. Dec 13 14:05:31.697764 systemd[1583]: Reached target default.target. Dec 13 14:05:31.697912 systemd[1583]: Startup finished in 187ms. Dec 13 14:05:36.886812 waagent[1572]: 2024-12-13T14:05:36.886701Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:05:36.893845 waagent[1572]: 2024-12-13T14:05:36.893762Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:05:36.898490 waagent[1572]: 2024-12-13T14:05:36.898426Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:05:36.911269 waagent[1572]: 2024-12-13T14:05:36.902712Z INFO Daemon Daemon Run daemon Dec 13 14:05:36.911269 waagent[1572]: 2024-12-13T14:05:36.907507Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:05:36.926084 waagent[1572]: 2024-12-13T14:05:36.925928Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:05:36.942913 waagent[1572]: 2024-12-13T14:05:36.942771Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:05:36.953537 waagent[1572]: 2024-12-13T14:05:36.953463Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:05:36.959127 waagent[1572]: 2024-12-13T14:05:36.959061Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:05:36.966177 waagent[1572]: 2024-12-13T14:05:36.966109Z INFO Daemon Daemon Activate resource disk Dec 13 14:05:36.971439 waagent[1572]: 2024-12-13T14:05:36.971376Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:05:36.986671 waagent[1572]: 2024-12-13T14:05:36.986599Z INFO Daemon Daemon Found device: None Dec 13 14:05:36.991653 waagent[1572]: 2024-12-13T14:05:36.991589Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:05:37.000965 waagent[1572]: 2024-12-13T14:05:37.000904Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:05:37.014487 waagent[1572]: 2024-12-13T14:05:37.014417Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:05:37.020870 waagent[1572]: 2024-12-13T14:05:37.020807Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:05:37.034841 waagent[1572]: 2024-12-13T14:05:37.034698Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:05:37.052349 waagent[1572]: 2024-12-13T14:05:37.052165Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:05:37.063832 waagent[1572]: 2024-12-13T14:05:37.063752Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:05:37.069683 waagent[1572]: 2024-12-13T14:05:37.069613Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:05:37.149889 waagent[1572]: 2024-12-13T14:05:37.149705Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:05:37.185919 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:05:37.230127 waagent[1572]: 2024-12-13T14:05:37.229987Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:05:37.235940 waagent[1572]: 2024-12-13T14:05:37.235857Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:05:37.242845 waagent[1572]: 2024-12-13T14:05:37.242773Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:05:37.250713 waagent[1572]: 2024-12-13T14:05:37.250624Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:05:37.257339 waagent[1572]: 2024-12-13T14:05:37.257242Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:05:37.263323 waagent[1572]: 2024-12-13T14:05:37.263224Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:05:37.384354 waagent[1572]: 2024-12-13T14:05:37.384259Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:05:37.391818 waagent[1572]: 2024-12-13T14:05:37.391772Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:05:37.397417 waagent[1572]: 2024-12-13T14:05:37.397351Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:05:38.282993 waagent[1572]: 2024-12-13T14:05:38.282846Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:05:38.299140 waagent[1572]: 2024-12-13T14:05:38.299064Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:05:38.305737 waagent[1572]: 2024-12-13T14:05:38.305666Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:05:38.405285 waagent[1572]: 2024-12-13T14:05:38.405139Z INFO Daemon Daemon Found private key matching thumbprint D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E Dec 13 14:05:38.415008 waagent[1572]: 2024-12-13T14:05:38.414917Z INFO Daemon Daemon Certificate with thumbprint E31F056E86498D8242F1445A24628E02F5F0117A has no matching private key. Dec 13 14:05:38.425706 waagent[1572]: 2024-12-13T14:05:38.425618Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:05:38.495060 waagent[1572]: 2024-12-13T14:05:38.495003Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2837cd9e-7b06-42ce-b757-07437c8c9bb3 New eTag: 6411633875753645486] Dec 13 14:05:38.506979 waagent[1572]: 2024-12-13T14:05:38.506891Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:05:38.523995 waagent[1572]: 2024-12-13T14:05:38.523932Z INFO Daemon Daemon Starting provisioning Dec 13 14:05:38.529694 waagent[1572]: 2024-12-13T14:05:38.529617Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:05:38.535225 waagent[1572]: 2024-12-13T14:05:38.535118Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-1df240c4f3] Dec 13 14:05:38.575176 waagent[1572]: 2024-12-13T14:05:38.575049Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-1df240c4f3] Dec 13 14:05:38.584900 waagent[1572]: 2024-12-13T14:05:38.584806Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:05:38.592478 waagent[1572]: 2024-12-13T14:05:38.592399Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:05:38.609236 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:05:38.609424 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:05:38.609480 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:05:38.609715 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:05:38.614322 systemd-networkd[1246]: eth0: DHCPv6 lease lost Dec 13 14:05:38.616162 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:05:38.616353 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:05:38.618354 systemd[1]: Starting systemd-networkd.service... Dec 13 14:05:38.645807 systemd-networkd[1631]: enP19167s1: Link UP Dec 13 14:05:38.645819 systemd-networkd[1631]: enP19167s1: Gained carrier Dec 13 14:05:38.646737 systemd-networkd[1631]: eth0: Link UP Dec 13 14:05:38.646748 systemd-networkd[1631]: eth0: Gained carrier Dec 13 14:05:38.647055 systemd-networkd[1631]: lo: Link UP Dec 13 14:05:38.647064 systemd-networkd[1631]: lo: Gained carrier Dec 13 14:05:38.647308 systemd-networkd[1631]: eth0: Gained IPv6LL Dec 13 14:05:38.648620 systemd-networkd[1631]: Enumeration completed Dec 13 14:05:38.648732 systemd[1]: Started systemd-networkd.service. Dec 13 14:05:38.650503 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:05:38.653802 systemd-networkd[1631]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:05:38.654766 waagent[1572]: 2024-12-13T14:05:38.654614Z INFO Daemon Daemon Create user account if not exists Dec 13 14:05:38.661435 waagent[1572]: 2024-12-13T14:05:38.661348Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:05:38.667946 waagent[1572]: 2024-12-13T14:05:38.667867Z INFO Daemon Daemon Configure sudoer Dec 13 14:05:38.675376 waagent[1572]: 2024-12-13T14:05:38.675291Z INFO Daemon Daemon Configure sshd Dec 13 14:05:38.680262 waagent[1572]: 2024-12-13T14:05:38.680186Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:05:38.688387 systemd-networkd[1631]: eth0: DHCPv4 address 10.200.20.37/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:05:38.690650 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:05:39.842403 waagent[1572]: 2024-12-13T14:05:39.842312Z INFO Daemon Daemon Provisioning complete Dec 13 14:05:39.867414 waagent[1572]: 2024-12-13T14:05:39.867341Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:05:39.873907 waagent[1572]: 2024-12-13T14:05:39.873825Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:05:39.885097 waagent[1572]: 2024-12-13T14:05:39.885011Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:05:40.188052 waagent[1640]: 2024-12-13T14:05:40.187898Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:05:40.188788 waagent[1640]: 2024-12-13T14:05:40.188728Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:40.188927 waagent[1640]: 2024-12-13T14:05:40.188882Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:40.203853 waagent[1640]: 2024-12-13T14:05:40.203776Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:05:40.204032 waagent[1640]: 2024-12-13T14:05:40.203985Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:05:40.272076 waagent[1640]: 2024-12-13T14:05:40.271936Z INFO ExtHandler ExtHandler Found private key matching thumbprint D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E Dec 13 14:05:40.272300 waagent[1640]: 2024-12-13T14:05:40.272233Z INFO ExtHandler ExtHandler Certificate with thumbprint E31F056E86498D8242F1445A24628E02F5F0117A has no matching private key. Dec 13 14:05:40.272537 waagent[1640]: 2024-12-13T14:05:40.272486Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:05:40.288401 waagent[1640]: 2024-12-13T14:05:40.288346Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: b90e4a35-5c04-447e-999a-8afc61b29eaf New eTag: 6411633875753645486] Dec 13 14:05:40.288959 waagent[1640]: 2024-12-13T14:05:40.288902Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:05:40.378050 waagent[1640]: 2024-12-13T14:05:40.377910Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:05:40.388317 waagent[1640]: 2024-12-13T14:05:40.388222Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1640 Dec 13 14:05:40.392053 waagent[1640]: 2024-12-13T14:05:40.391988Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:05:40.393424 waagent[1640]: 2024-12-13T14:05:40.393366Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:05:40.507548 waagent[1640]: 2024-12-13T14:05:40.507485Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:05:40.507946 waagent[1640]: 2024-12-13T14:05:40.507888Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:05:40.515875 waagent[1640]: 2024-12-13T14:05:40.515808Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:05:40.516436 waagent[1640]: 2024-12-13T14:05:40.516381Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:05:40.517605 waagent[1640]: 2024-12-13T14:05:40.517540Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:05:40.518957 waagent[1640]: 2024-12-13T14:05:40.518884Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:05:40.519619 waagent[1640]: 2024-12-13T14:05:40.519559Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:40.519884 waagent[1640]: 2024-12-13T14:05:40.519834Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:40.520563 waagent[1640]: 2024-12-13T14:05:40.520506Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:05:40.520967 waagent[1640]: 2024-12-13T14:05:40.520913Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:05:40.520967 waagent[1640]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:05:40.520967 waagent[1640]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:05:40.520967 waagent[1640]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:05:40.520967 waagent[1640]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:40.520967 waagent[1640]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:40.520967 waagent[1640]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:40.523384 waagent[1640]: 2024-12-13T14:05:40.523196Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:05:40.524330 waagent[1640]: 2024-12-13T14:05:40.524244Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:40.524608 waagent[1640]: 2024-12-13T14:05:40.524556Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:40.525264 waagent[1640]: 2024-12-13T14:05:40.525205Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:05:40.525540 waagent[1640]: 2024-12-13T14:05:40.525492Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:05:40.525745 waagent[1640]: 2024-12-13T14:05:40.525702Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:05:40.526520 waagent[1640]: 2024-12-13T14:05:40.526445Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:05:40.526609 waagent[1640]: 2024-12-13T14:05:40.526558Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:05:40.527487 waagent[1640]: 2024-12-13T14:05:40.527409Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:05:40.527584 waagent[1640]: 2024-12-13T14:05:40.527518Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:05:40.528098 waagent[1640]: 2024-12-13T14:05:40.528024Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:05:40.538967 waagent[1640]: 2024-12-13T14:05:40.538880Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:05:40.540517 waagent[1640]: 2024-12-13T14:05:40.540448Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:05:40.541832 waagent[1640]: 2024-12-13T14:05:40.541768Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:05:40.564889 waagent[1640]: 2024-12-13T14:05:40.564741Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1631' Dec 13 14:05:40.608735 waagent[1640]: 2024-12-13T14:05:40.608664Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:05:40.653945 waagent[1640]: 2024-12-13T14:05:40.653813Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:05:40.653945 waagent[1640]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:05:40.653945 waagent[1640]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:05:40.653945 waagent[1640]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:2c:c3 brd ff:ff:ff:ff:ff:ff Dec 13 14:05:40.653945 waagent[1640]: 3: enP19167s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:2c:c3 brd ff:ff:ff:ff:ff:ff\ altname enP19167p0s2 Dec 13 14:05:40.653945 waagent[1640]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:05:40.653945 waagent[1640]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:05:40.653945 waagent[1640]: 2: eth0 inet 10.200.20.37/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:05:40.653945 waagent[1640]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:05:40.653945 waagent[1640]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:05:40.653945 waagent[1640]: 2: eth0 inet6 fe80::20d:3aff:fec5:2cc3/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:05:40.694431 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:05:40.694603 systemd[1]: Stopped kubelet.service. Dec 13 14:05:40.695974 systemd[1]: Starting kubelet.service... Dec 13 14:05:40.783193 systemd[1]: Started kubelet.service. Dec 13 14:05:40.862176 kubelet[1673]: E1213 14:05:40.862138 1673 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:05:40.865290 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:05:40.865418 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:05:41.001789 waagent[1640]: 2024-12-13T14:05:41.001726Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:05:41.888822 waagent[1572]: 2024-12-13T14:05:41.888705Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:05:41.895456 waagent[1572]: 2024-12-13T14:05:41.895388Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:05:43.124659 waagent[1682]: 2024-12-13T14:05:43.124552Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:05:43.125377 waagent[1682]: 2024-12-13T14:05:43.125316Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:05:43.125514 waagent[1682]: 2024-12-13T14:05:43.125469Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:05:43.125640 waagent[1682]: 2024-12-13T14:05:43.125598Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Dec 13 14:05:43.133539 waagent[1682]: 2024-12-13T14:05:43.133423Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:05:43.133950 waagent[1682]: 2024-12-13T14:05:43.133893Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:43.134097 waagent[1682]: 2024-12-13T14:05:43.134052Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:43.147830 waagent[1682]: 2024-12-13T14:05:43.147756Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:05:43.160203 waagent[1682]: 2024-12-13T14:05:43.160145Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:05:43.161304 waagent[1682]: 2024-12-13T14:05:43.161230Z INFO ExtHandler Dec 13 14:05:43.161454 waagent[1682]: 2024-12-13T14:05:43.161406Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 4297fbf0-d610-407b-9506-d1ead80efeca eTag: 6411633875753645486 source: Fabric] Dec 13 14:05:43.162190 waagent[1682]: 2024-12-13T14:05:43.162133Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:05:43.163422 waagent[1682]: 2024-12-13T14:05:43.163362Z INFO ExtHandler Dec 13 14:05:43.163553 waagent[1682]: 2024-12-13T14:05:43.163508Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:05:43.170053 waagent[1682]: 2024-12-13T14:05:43.170004Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:05:43.170541 waagent[1682]: 2024-12-13T14:05:43.170490Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:05:43.191117 waagent[1682]: 2024-12-13T14:05:43.191054Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:05:43.266310 waagent[1682]: 2024-12-13T14:05:43.266155Z INFO ExtHandler Downloaded certificate {'thumbprint': 'E31F056E86498D8242F1445A24628E02F5F0117A', 'hasPrivateKey': False} Dec 13 14:05:43.270386 waagent[1682]: 2024-12-13T14:05:43.270316Z INFO ExtHandler Downloaded certificate {'thumbprint': 'D50069850D28EB9CCA7E4D4C35A58ACE7923BE8E', 'hasPrivateKey': True} Dec 13 14:05:43.271424 waagent[1682]: 2024-12-13T14:05:43.271364Z INFO ExtHandler Fetch goal state completed Dec 13 14:05:43.293582 waagent[1682]: 2024-12-13T14:05:43.293471Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:05:43.305983 waagent[1682]: 2024-12-13T14:05:43.305862Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1682 Dec 13 14:05:43.309358 waagent[1682]: 2024-12-13T14:05:43.309295Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:05:43.310437 waagent[1682]: 2024-12-13T14:05:43.310381Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:05:43.310737 waagent[1682]: 2024-12-13T14:05:43.310685Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:05:43.312928 waagent[1682]: 2024-12-13T14:05:43.312873Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:05:43.317726 waagent[1682]: 2024-12-13T14:05:43.317665Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:05:43.318116 waagent[1682]: 2024-12-13T14:05:43.318058Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:05:43.326605 waagent[1682]: 2024-12-13T14:05:43.326537Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:05:43.327198 waagent[1682]: 2024-12-13T14:05:43.327140Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:05:43.333536 waagent[1682]: 2024-12-13T14:05:43.333418Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 14:05:43.334740 waagent[1682]: 2024-12-13T14:05:43.334667Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:05:43.336347 waagent[1682]: 2024-12-13T14:05:43.336251Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:05:43.336982 waagent[1682]: 2024-12-13T14:05:43.336925Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:43.337249 waagent[1682]: 2024-12-13T14:05:43.337201Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:43.337988 waagent[1682]: 2024-12-13T14:05:43.337930Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:05:43.338389 waagent[1682]: 2024-12-13T14:05:43.338336Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:05:43.338389 waagent[1682]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:05:43.338389 waagent[1682]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:05:43.338389 waagent[1682]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:05:43.338389 waagent[1682]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:43.338389 waagent[1682]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:43.338389 waagent[1682]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:05:43.341090 waagent[1682]: 2024-12-13T14:05:43.340949Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:05:43.341445 waagent[1682]: 2024-12-13T14:05:43.341379Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:05:43.341999 waagent[1682]: 2024-12-13T14:05:43.341937Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:05:43.342149 waagent[1682]: 2024-12-13T14:05:43.342104Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:05:43.342263 waagent[1682]: 2024-12-13T14:05:43.342221Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:05:43.342449 waagent[1682]: 2024-12-13T14:05:43.342375Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:05:43.342956 waagent[1682]: 2024-12-13T14:05:43.342884Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:05:43.343885 waagent[1682]: 2024-12-13T14:05:43.343803Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:05:43.344447 waagent[1682]: 2024-12-13T14:05:43.344368Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:05:43.344718 waagent[1682]: 2024-12-13T14:05:43.344661Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:05:43.345449 waagent[1682]: 2024-12-13T14:05:43.345375Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:05:43.366885 waagent[1682]: 2024-12-13T14:05:43.366793Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:05:43.366885 waagent[1682]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:05:43.366885 waagent[1682]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:05:43.366885 waagent[1682]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:2c:c3 brd ff:ff:ff:ff:ff:ff Dec 13 14:05:43.366885 waagent[1682]: 3: enP19167s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:c5:2c:c3 brd ff:ff:ff:ff:ff:ff\ altname enP19167p0s2 Dec 13 14:05:43.366885 waagent[1682]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:05:43.366885 waagent[1682]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:05:43.366885 waagent[1682]: 2: eth0 inet 10.200.20.37/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:05:43.366885 waagent[1682]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:05:43.366885 waagent[1682]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:05:43.366885 waagent[1682]: 2: eth0 inet6 fe80::20d:3aff:fec5:2cc3/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:05:43.373167 waagent[1682]: 2024-12-13T14:05:43.373081Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:05:43.421297 waagent[1682]: 2024-12-13T14:05:43.421056Z INFO ExtHandler ExtHandler Dec 13 14:05:43.421468 waagent[1682]: 2024-12-13T14:05:43.421403Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 50c12560-ac17-402c-b063-2eda2b0f4095 correlation f9719631-1e2e-4cd2-9beb-018d4648cb8b created: 2024-12-13T14:04:08.602829Z] Dec 13 14:05:43.422929 waagent[1682]: 2024-12-13T14:05:43.422848Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:05:43.425046 waagent[1682]: 2024-12-13T14:05:43.424985Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Dec 13 14:05:43.451279 waagent[1682]: 2024-12-13T14:05:43.451186Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:05:43.468780 waagent[1682]: 2024-12-13T14:05:43.468650Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: CB0A9443-4291-44FD-89CD-AC7CCDD6D900;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:05:43.597051 waagent[1682]: 2024-12-13T14:05:43.596907Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 14:05:43.597051 waagent[1682]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.597051 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.597051 waagent[1682]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.597051 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.597051 waagent[1682]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.597051 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.597051 waagent[1682]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:05:43.597051 waagent[1682]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:05:43.597051 waagent[1682]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:05:43.605971 waagent[1682]: 2024-12-13T14:05:43.605841Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:05:43.605971 waagent[1682]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.605971 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.605971 waagent[1682]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.605971 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.605971 waagent[1682]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:05:43.605971 waagent[1682]: pkts bytes target prot opt in out source destination Dec 13 14:05:43.605971 waagent[1682]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:05:43.605971 waagent[1682]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:05:43.605971 waagent[1682]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:05:43.606901 waagent[1682]: 2024-12-13T14:05:43.606851Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:05:50.944430 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:05:50.944593 systemd[1]: Stopped kubelet.service. Dec 13 14:05:50.946055 systemd[1]: Starting kubelet.service... Dec 13 14:05:51.030379 systemd[1]: Started kubelet.service. Dec 13 14:05:51.124693 kubelet[1737]: E1213 14:05:51.124654 1737 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:05:51.127172 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:05:51.127323 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:01.194454 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:06:01.194626 systemd[1]: Stopped kubelet.service. Dec 13 14:06:01.196014 systemd[1]: Starting kubelet.service... Dec 13 14:06:01.276097 systemd[1]: Started kubelet.service. Dec 13 14:06:01.335248 kubelet[1747]: E1213 14:06:01.335190 1747 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:01.337628 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:01.337751 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:08.895774 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Dec 13 14:06:11.444433 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:06:11.444602 systemd[1]: Stopped kubelet.service. Dec 13 14:06:11.445949 systemd[1]: Starting kubelet.service... Dec 13 14:06:11.525254 systemd[1]: Started kubelet.service. Dec 13 14:06:11.564328 kubelet[1757]: E1213 14:06:11.564244 1757 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:11.567175 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:11.567335 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:15.353691 update_engine[1462]: I1213 14:06:15.353313 1462 update_attempter.cc:509] Updating boot flags... Dec 13 14:06:15.494957 systemd[1]: Created slice system-sshd.slice. Dec 13 14:06:15.496554 systemd[1]: Started sshd@0-10.200.20.37:22-10.200.16.10:57144.service. Dec 13 14:06:16.101759 sshd[1831]: Accepted publickey for core from 10.200.16.10 port 57144 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:16.118959 sshd[1831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:16.123114 systemd[1]: Started session-3.scope. Dec 13 14:06:16.123711 systemd-logind[1461]: New session 3 of user core. Dec 13 14:06:16.503790 systemd[1]: Started sshd@1-10.200.20.37:22-10.200.16.10:57154.service. Dec 13 14:06:16.914066 sshd[1836]: Accepted publickey for core from 10.200.16.10 port 57154 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:16.915811 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:16.919492 systemd-logind[1461]: New session 4 of user core. Dec 13 14:06:16.919929 systemd[1]: Started session-4.scope. Dec 13 14:06:17.217664 sshd[1836]: pam_unix(sshd:session): session closed for user core Dec 13 14:06:17.220134 systemd[1]: sshd@1-10.200.20.37:22-10.200.16.10:57154.service: Deactivated successfully. Dec 13 14:06:17.220830 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:06:17.221348 systemd-logind[1461]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:06:17.221993 systemd-logind[1461]: Removed session 4. Dec 13 14:06:17.292713 systemd[1]: Started sshd@2-10.200.20.37:22-10.200.16.10:57160.service. Dec 13 14:06:17.702361 sshd[1842]: Accepted publickey for core from 10.200.16.10 port 57160 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:17.703713 sshd[1842]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:17.708150 systemd[1]: Started session-5.scope. Dec 13 14:06:17.708492 systemd-logind[1461]: New session 5 of user core. Dec 13 14:06:18.003469 sshd[1842]: pam_unix(sshd:session): session closed for user core Dec 13 14:06:18.006312 systemd[1]: sshd@2-10.200.20.37:22-10.200.16.10:57160.service: Deactivated successfully. Dec 13 14:06:18.007024 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:06:18.007603 systemd-logind[1461]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:06:18.008531 systemd-logind[1461]: Removed session 5. Dec 13 14:06:18.075600 systemd[1]: Started sshd@3-10.200.20.37:22-10.200.16.10:57172.service. Dec 13 14:06:18.481060 sshd[1848]: Accepted publickey for core from 10.200.16.10 port 57172 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:18.482467 sshd[1848]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:18.486937 systemd[1]: Started session-6.scope. Dec 13 14:06:18.487982 systemd-logind[1461]: New session 6 of user core. Dec 13 14:06:18.792161 sshd[1848]: pam_unix(sshd:session): session closed for user core Dec 13 14:06:18.795479 systemd[1]: sshd@3-10.200.20.37:22-10.200.16.10:57172.service: Deactivated successfully. Dec 13 14:06:18.796198 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:06:18.796721 systemd-logind[1461]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:06:18.797630 systemd-logind[1461]: Removed session 6. Dec 13 14:06:18.860665 systemd[1]: Started sshd@4-10.200.20.37:22-10.200.16.10:35876.service. Dec 13 14:06:19.274212 sshd[1854]: Accepted publickey for core from 10.200.16.10 port 35876 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:19.275909 sshd[1854]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:19.279856 systemd-logind[1461]: New session 7 of user core. Dec 13 14:06:19.280367 systemd[1]: Started session-7.scope. Dec 13 14:06:19.733727 sudo[1857]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:06:19.733949 sudo[1857]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:06:19.802465 dbus-daemon[1450]: avc: received setenforce notice (enforcing=1) Dec 13 14:06:19.804343 sudo[1857]: pam_unix(sudo:session): session closed for user root Dec 13 14:06:19.920221 sshd[1854]: pam_unix(sshd:session): session closed for user core Dec 13 14:06:19.923102 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:06:19.923874 systemd[1]: sshd@4-10.200.20.37:22-10.200.16.10:35876.service: Deactivated successfully. Dec 13 14:06:19.924186 systemd-logind[1461]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:06:19.925195 systemd-logind[1461]: Removed session 7. Dec 13 14:06:19.989293 systemd[1]: Started sshd@5-10.200.20.37:22-10.200.16.10:35880.service. Dec 13 14:06:20.402746 sshd[1861]: Accepted publickey for core from 10.200.16.10 port 35880 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:20.404496 sshd[1861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:20.408866 systemd[1]: Started session-8.scope. Dec 13 14:06:20.409459 systemd-logind[1461]: New session 8 of user core. Dec 13 14:06:20.641099 sudo[1865]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:06:20.641704 sudo[1865]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:06:20.644697 sudo[1865]: pam_unix(sudo:session): session closed for user root Dec 13 14:06:20.649679 sudo[1864]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:06:20.649906 sudo[1864]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:06:20.658984 systemd[1]: Stopping audit-rules.service... Dec 13 14:06:20.665294 kernel: kauditd_printk_skb: 132 callbacks suppressed Dec 13 14:06:20.665414 kernel: audit: type=1305 audit(1734098780.659:211): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:06:20.659000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:06:20.676193 auditctl[1868]: No rules Dec 13 14:06:20.676623 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:06:20.659000 audit[1868]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff6e2efc0 a2=420 a3=0 items=0 ppid=1 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:20.676834 systemd[1]: Stopped audit-rules.service. Dec 13 14:06:20.701868 kernel: audit: type=1300 audit(1734098780.659:211): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff6e2efc0 a2=420 a3=0 items=0 ppid=1 pid=1868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:20.678629 systemd[1]: Starting audit-rules.service... Dec 13 14:06:20.702148 augenrules[1885]: No rules Dec 13 14:06:20.659000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:06:20.710000 kernel: audit: type=1327 audit(1734098780.659:211): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:06:20.703006 systemd[1]: Finished audit-rules.service. Dec 13 14:06:20.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.727615 kernel: audit: type=1131 audit(1734098780.675:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.727888 sudo[1864]: pam_unix(sudo:session): session closed for user root Dec 13 14:06:20.744954 kernel: audit: type=1130 audit(1734098780.701:213): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.726000 audit[1864]: USER_END pid=1864 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.765281 kernel: audit: type=1106 audit(1734098780.726:214): pid=1864 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.726000 audit[1864]: CRED_DISP pid=1864 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.782738 kernel: audit: type=1104 audit(1734098780.726:215): pid=1864 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.844384 sshd[1861]: pam_unix(sshd:session): session closed for user core Dec 13 14:06:20.844000 audit[1861]: USER_END pid=1861 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:20.878141 systemd[1]: sshd@5-10.200.20.37:22-10.200.16.10:35880.service: Deactivated successfully. Dec 13 14:06:20.878916 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:06:20.844000 audit[1861]: CRED_DISP pid=1861 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:20.900364 kernel: audit: type=1106 audit(1734098780.844:216): pid=1861 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:20.900485 kernel: audit: type=1104 audit(1734098780.844:217): pid=1861 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:20.900514 kernel: audit: type=1131 audit(1734098780.877:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.37:22-10.200.16.10:35880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.877000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.37:22-10.200.16.10:35880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.900741 systemd-logind[1461]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:06:20.924083 systemd-logind[1461]: Removed session 8. Dec 13 14:06:20.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.37:22-10.200.16.10:35886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:20.924825 systemd[1]: Started sshd@6-10.200.20.37:22-10.200.16.10:35886.service. Dec 13 14:06:21.337000 audit[1894]: USER_ACCT pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:21.339070 sshd[1894]: Accepted publickey for core from 10.200.16.10 port 35886 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:06:21.338000 audit[1894]: CRED_ACQ pid=1894 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:21.339000 audit[1894]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc59fb20 a2=3 a3=1 items=0 ppid=1 pid=1894 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:21.339000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:06:21.340793 sshd[1894]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:21.345230 systemd[1]: Started session-9.scope. Dec 13 14:06:21.346245 systemd-logind[1461]: New session 9 of user core. Dec 13 14:06:21.349000 audit[1894]: USER_START pid=1894 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:21.350000 audit[1896]: CRED_ACQ pid=1896 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:06:21.576000 audit[1897]: USER_ACCT pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.577602 sudo[1897]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:06:21.576000 audit[1897]: CRED_REFR pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.577819 sudo[1897]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:06:21.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.577000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.578000 audit[1897]: USER_START pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.578534 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:06:21.578738 systemd[1]: Stopped kubelet.service. Dec 13 14:06:21.580223 systemd[1]: Starting kubelet.service... Dec 13 14:06:21.606086 systemd[1]: Starting docker.service... Dec 13 14:06:21.683364 systemd[1]: Started kubelet.service. Dec 13 14:06:21.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:21.708103 env[1909]: time="2024-12-13T14:06:21.708056443Z" level=info msg="Starting up" Dec 13 14:06:21.709667 env[1909]: time="2024-12-13T14:06:21.709638789Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:06:21.709667 env[1909]: time="2024-12-13T14:06:21.709661069Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:06:21.709778 env[1909]: time="2024-12-13T14:06:21.709681149Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:06:21.709778 env[1909]: time="2024-12-13T14:06:21.709692349Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:06:21.711952 env[1909]: time="2024-12-13T14:06:21.711929569Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:06:21.712054 env[1909]: time="2024-12-13T14:06:21.712040568Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:06:21.712117 env[1909]: time="2024-12-13T14:06:21.712103728Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:06:21.712167 env[1909]: time="2024-12-13T14:06:21.712156287Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:06:21.718356 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport47247433-merged.mount: Deactivated successfully. Dec 13 14:06:21.743288 kubelet[1917]: E1213 14:06:21.743233 1917 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:21.745294 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:21.745428 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:21.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:22.088702 env[1909]: time="2024-12-13T14:06:22.088316445Z" level=info msg="Loading containers: start." Dec 13 14:06:22.167000 audit[1945]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1945 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.167000 audit[1945]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffcbfea950 a2=0 a3=1 items=0 ppid=1909 pid=1945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.167000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:06:22.168000 audit[1947]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1947 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.168000 audit[1947]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffd0726bc0 a2=0 a3=1 items=0 ppid=1909 pid=1947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.168000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:06:22.170000 audit[1949]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.170000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc87305a0 a2=0 a3=1 items=0 ppid=1909 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.170000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:06:22.172000 audit[1951]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.172000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffff25db840 a2=0 a3=1 items=0 ppid=1909 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:06:22.173000 audit[1953]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.173000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc5868a70 a2=0 a3=1 items=0 ppid=1909 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:06:22.175000 audit[1955]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.175000 audit[1955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff1a083f0 a2=0 a3=1 items=0 ppid=1909 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:06:22.194000 audit[1957]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.194000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffea1d9c50 a2=0 a3=1 items=0 ppid=1909 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.194000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:06:22.195000 audit[1959]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.195000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffef5d37d0 a2=0 a3=1 items=0 ppid=1909 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.195000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:06:22.197000 audit[1961]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.197000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc8d8d180 a2=0 a3=1 items=0 ppid=1909 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:06:22.214000 audit[1965]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.214000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc49e8910 a2=0 a3=1 items=0 ppid=1909 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.214000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:06:22.224000 audit[1966]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1966 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.224000 audit[1966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd485da80 a2=0 a3=1 items=0 ppid=1909 pid=1966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.224000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:06:22.267295 kernel: Initializing XFRM netlink socket Dec 13 14:06:22.304180 env[1909]: time="2024-12-13T14:06:22.304135139Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:06:22.414000 audit[1973]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1973 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.414000 audit[1973]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc28087c0 a2=0 a3=1 items=0 ppid=1909 pid=1973 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.414000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:06:22.426000 audit[1976]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1976 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.426000 audit[1976]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffe16708a0 a2=0 a3=1 items=0 ppid=1909 pid=1976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.426000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:06:22.429000 audit[1979]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1979 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.429000 audit[1979]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffffc1bfff0 a2=0 a3=1 items=0 ppid=1909 pid=1979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.429000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:06:22.431000 audit[1981]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1981 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.431000 audit[1981]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd4c41f70 a2=0 a3=1 items=0 ppid=1909 pid=1981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.431000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:06:22.433000 audit[1983]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1983 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.433000 audit[1983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffe41b2f00 a2=0 a3=1 items=0 ppid=1909 pid=1983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.433000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:06:22.435000 audit[1985]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1985 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.435000 audit[1985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffcfd316a0 a2=0 a3=1 items=0 ppid=1909 pid=1985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.435000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:06:22.437000 audit[1987]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1987 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.437000 audit[1987]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff70f4eb0 a2=0 a3=1 items=0 ppid=1909 pid=1987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.437000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:06:22.439000 audit[1989]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1989 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.439000 audit[1989]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffed1a9d70 a2=0 a3=1 items=0 ppid=1909 pid=1989 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.439000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:06:22.440000 audit[1991]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1991 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.440000 audit[1991]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffcfc9e690 a2=0 a3=1 items=0 ppid=1909 pid=1991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:06:22.442000 audit[1993]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1993 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.442000 audit[1993]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe5622170 a2=0 a3=1 items=0 ppid=1909 pid=1993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:06:22.444000 audit[1995]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1995 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.444000 audit[1995]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff52d7b00 a2=0 a3=1 items=0 ppid=1909 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.444000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:06:22.446375 systemd-networkd[1631]: docker0: Link UP Dec 13 14:06:22.463000 audit[1999]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1999 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.463000 audit[1999]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffec73cd00 a2=0 a3=1 items=0 ppid=1909 pid=1999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:06:22.472000 audit[2000]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=2000 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:22.472000 audit[2000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffefa0610 a2=0 a3=1 items=0 ppid=1909 pid=2000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:22.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:06:22.473760 env[1909]: time="2024-12-13T14:06:22.473731286Z" level=info msg="Loading containers: done." Dec 13 14:06:22.483460 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3470672375-merged.mount: Deactivated successfully. Dec 13 14:06:22.521909 env[1909]: time="2024-12-13T14:06:22.521866057Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:06:22.522335 env[1909]: time="2024-12-13T14:06:22.522314053Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:06:22.522566 env[1909]: time="2024-12-13T14:06:22.522550331Z" level=info msg="Daemon has completed initialization" Dec 13 14:06:22.552973 systemd[1]: Started docker.service. Dec 13 14:06:22.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:22.557397 env[1909]: time="2024-12-13T14:06:22.557342369Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:06:27.761848 env[1493]: time="2024-12-13T14:06:27.761807279Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\"" Dec 13 14:06:28.789750 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount62623487.mount: Deactivated successfully. Dec 13 14:06:31.315888 env[1493]: time="2024-12-13T14:06:31.315829696Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:31.324381 env[1493]: time="2024-12-13T14:06:31.324327975Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8202e87ffef091fe4f11dd113ff6f2ab16c70279775d224ddd8aa95e2dd0b966,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:31.333941 env[1493]: time="2024-12-13T14:06:31.333889503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:31.341017 env[1493]: time="2024-12-13T14:06:31.340969689Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f0e1b3de0c2e98e6c6abd73edf9d3b8e4d44460656cde0ebb92e2d9206961fcb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:31.341862 env[1493]: time="2024-12-13T14:06:31.341830737Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.8\" returns image reference \"sha256:8202e87ffef091fe4f11dd113ff6f2ab16c70279775d224ddd8aa95e2dd0b966\"" Dec 13 14:06:31.351448 env[1493]: time="2024-12-13T14:06:31.351400586Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\"" Dec 13 14:06:31.944423 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 14:06:31.944601 systemd[1]: Stopped kubelet.service. Dec 13 14:06:31.965963 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 14:06:31.966081 kernel: audit: type=1130 audit(1734098791.943:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:31.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:31.946202 systemd[1]: Starting kubelet.service... Dec 13 14:06:31.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:31.983460 kernel: audit: type=1131 audit(1734098791.943:258): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:32.032989 systemd[1]: Started kubelet.service. Dec 13 14:06:32.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:32.056327 kernel: audit: type=1130 audit(1734098792.031:259): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:32.096895 kubelet[2047]: E1213 14:06:32.096839 2047 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:32.099191 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:32.099352 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:32.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:32.120391 kernel: audit: type=1131 audit(1734098792.098:260): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:34.309526 env[1493]: time="2024-12-13T14:06:34.309467844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:34.316971 env[1493]: time="2024-12-13T14:06:34.316922307Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b2191aa4d4d6ca9fbd7704b35401bfa6b0b90de75db22c425053e97fd5c8338,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:34.321820 env[1493]: time="2024-12-13T14:06:34.321779469Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:34.327350 env[1493]: time="2024-12-13T14:06:34.327307876Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:124f66b7e877eb5a80a40503057299bb60e6a5f2130905f4e3293dabf194c397,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:34.328005 env[1493]: time="2024-12-13T14:06:34.327975361Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.8\" returns image reference \"sha256:4b2191aa4d4d6ca9fbd7704b35401bfa6b0b90de75db22c425053e97fd5c8338\"" Dec 13 14:06:34.340552 env[1493]: time="2024-12-13T14:06:34.340515348Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\"" Dec 13 14:06:36.127054 env[1493]: time="2024-12-13T14:06:36.127004567Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:36.132740 env[1493]: time="2024-12-13T14:06:36.132700533Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d43326c1723208785a33cdc1507082792eb041ca0d789c103c90180e31f65ca8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:36.137190 env[1493]: time="2024-12-13T14:06:36.137155168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:36.140372 env[1493]: time="2024-12-13T14:06:36.140324194Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c8bdeac2590c99c1a77e33995423ddb6633ff90a82a2aa455442e0a8079ef8c7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:36.141206 env[1493]: time="2024-12-13T14:06:36.141172321Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.8\" returns image reference \"sha256:d43326c1723208785a33cdc1507082792eb041ca0d789c103c90180e31f65ca8\"" Dec 13 14:06:36.151396 env[1493]: time="2024-12-13T14:06:36.151326323Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\"" Dec 13 14:06:37.564180 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1551612487.mount: Deactivated successfully. Dec 13 14:06:38.018340 env[1493]: time="2024-12-13T14:06:38.018284438Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:38.023378 env[1493]: time="2024-12-13T14:06:38.023336076Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:38.027524 env[1493]: time="2024-12-13T14:06:38.027486788Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:38.030365 env[1493]: time="2024-12-13T14:06:38.030328810Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6d6be9417e22af78905000ac4fd134896bacd2188ea63c7cac8edd7a5d7e9b5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:38.030733 env[1493]: time="2024-12-13T14:06:38.030702013Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.8\" returns image reference \"sha256:4612aebc0675831aedbbde7cd56b85db91f1fdcf05ef923072961538ec497adb\"" Dec 13 14:06:38.039377 env[1493]: time="2024-12-13T14:06:38.039331119Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:06:39.271645 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1780973876.mount: Deactivated successfully. Dec 13 14:06:40.870056 env[1493]: time="2024-12-13T14:06:40.869998557Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:40.877759 env[1493]: time="2024-12-13T14:06:40.877712093Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:40.881323 env[1493]: time="2024-12-13T14:06:40.881280638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:40.885502 env[1493]: time="2024-12-13T14:06:40.885460789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:40.886213 env[1493]: time="2024-12-13T14:06:40.886180314Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:06:40.895481 env[1493]: time="2024-12-13T14:06:40.895441941Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 14:06:41.658850 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3133556523.mount: Deactivated successfully. Dec 13 14:06:41.683004 env[1493]: time="2024-12-13T14:06:41.682963350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:41.691136 env[1493]: time="2024-12-13T14:06:41.691093928Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:41.696732 env[1493]: time="2024-12-13T14:06:41.696693447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:41.701492 env[1493]: time="2024-12-13T14:06:41.701456241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:41.702163 env[1493]: time="2024-12-13T14:06:41.702136366Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Dec 13 14:06:41.711346 env[1493]: time="2024-12-13T14:06:41.711310070Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" Dec 13 14:06:42.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.194400 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Dec 13 14:06:42.194572 systemd[1]: Stopped kubelet.service. Dec 13 14:06:42.195965 systemd[1]: Starting kubelet.service... Dec 13 14:06:42.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.234335 kernel: audit: type=1130 audit(1734098802.193:261): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.234405 kernel: audit: type=1131 audit(1734098802.193:262): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.352776 systemd[1]: Started kubelet.service. Dec 13 14:06:42.374304 kernel: audit: type=1130 audit(1734098802.351:263): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:42.406944 kubelet[2082]: E1213 14:06:42.406901 2082 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:42.655090 kernel: audit: type=1131 audit(1734098802.408:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:42.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:42.409204 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:42.409349 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:42.706782 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4074799475.mount: Deactivated successfully. Dec 13 14:06:46.380320 env[1493]: time="2024-12-13T14:06:46.380250287Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:46.387511 env[1493]: time="2024-12-13T14:06:46.387463451Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:46.391019 env[1493]: time="2024-12-13T14:06:46.390980953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:46.395264 env[1493]: time="2024-12-13T14:06:46.395220419Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:46.396128 env[1493]: time="2024-12-13T14:06:46.396097984Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:014faa467e29798aeef733fe6d1a3b5e382688217b053ad23410e6cccd5d22fd\"" Dec 13 14:06:52.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.444428 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. Dec 13 14:06:52.444607 systemd[1]: Stopped kubelet.service. Dec 13 14:06:52.448147 systemd[1]: Starting kubelet.service... Dec 13 14:06:52.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.488476 kernel: audit: type=1130 audit(1734098812.443:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.488581 kernel: audit: type=1131 audit(1734098812.443:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.725693 systemd[1]: Started kubelet.service. Dec 13 14:06:52.750292 kernel: audit: type=1130 audit(1734098812.724:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:52.798096 kubelet[2153]: E1213 14:06:52.798057 2153 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:52.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:52.800907 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:52.801028 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:52.820289 kernel: audit: type=1131 audit(1734098812.799:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:06:53.649797 systemd[1]: Stopped kubelet.service. Dec 13 14:06:53.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:53.668240 systemd[1]: Starting kubelet.service... Dec 13 14:06:53.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:53.687273 kernel: audit: type=1130 audit(1734098813.648:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:53.687378 kernel: audit: type=1131 audit(1734098813.651:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:53.704327 systemd[1]: Reloading. Dec 13 14:06:53.802351 /usr/lib/systemd/system-generators/torcx-generator[2188]: time="2024-12-13T14:06:53Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:06:53.802379 /usr/lib/systemd/system-generators/torcx-generator[2188]: time="2024-12-13T14:06:53Z" level=info msg="torcx already run" Dec 13 14:06:53.862433 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:06:53.862603 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:06:53.878927 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:06:53.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990068 kernel: audit: type=1400 audit(1734098813.954:271): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990229 kernel: audit: type=1400 audit(1734098813.955:272): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.007406 kernel: audit: type=1400 audit(1734098813.955:273): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024415 kernel: audit: type=1400 audit(1734098813.955:274): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.973000 audit: BPF prog-id=41 op=LOAD Dec 13 14:06:53.973000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.988000 audit: BPF prog-id=42 op=LOAD Dec 13 14:06:53.988000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:53.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit: BPF prog-id=43 op=LOAD Dec 13 14:06:54.006000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit: BPF prog-id=44 op=LOAD Dec 13 14:06:54.023000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit: BPF prog-id=45 op=LOAD Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.023000 audit: BPF prog-id=46 op=LOAD Dec 13 14:06:54.023000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:06:54.023000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit: BPF prog-id=47 op=LOAD Dec 13 14:06:54.024000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit: BPF prog-id=48 op=LOAD Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.024000 audit: BPF prog-id=49 op=LOAD Dec 13 14:06:54.024000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:06:54.024000 audit: BPF prog-id=30 op=UNLOAD Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit: BPF prog-id=50 op=LOAD Dec 13 14:06:54.026000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit: BPF prog-id=51 op=LOAD Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit: BPF prog-id=52 op=LOAD Dec 13 14:06:54.026000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:06:54.026000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit: BPF prog-id=53 op=LOAD Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.027000 audit: BPF prog-id=54 op=LOAD Dec 13 14:06:54.027000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:06:54.027000 audit: BPF prog-id=32 op=UNLOAD Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.028000 audit: BPF prog-id=55 op=LOAD Dec 13 14:06:54.028000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:06:54.049578 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:06:54.049780 systemd[1]: Stopped kubelet.service. Dec 13 14:06:54.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:54.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:54.052372 systemd[1]: Starting kubelet.service... Dec 13 14:06:54.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:54.130867 systemd[1]: Started kubelet.service. Dec 13 14:06:54.209673 kubelet[2251]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:06:54.209673 kubelet[2251]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:06:54.209673 kubelet[2251]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:06:54.209673 kubelet[2251]: I1213 14:06:54.206026 2251 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:06:54.700448 kubelet[2251]: I1213 14:06:54.700420 2251 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:06:54.700576 kubelet[2251]: I1213 14:06:54.700566 2251 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:06:54.700865 kubelet[2251]: I1213 14:06:54.700851 2251 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:06:54.717170 kubelet[2251]: E1213 14:06:54.717135 2251 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.718022 kubelet[2251]: I1213 14:06:54.717999 2251 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:06:54.726538 kubelet[2251]: I1213 14:06:54.726515 2251 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:06:54.727895 kubelet[2251]: I1213 14:06:54.727860 2251 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:06:54.728165 kubelet[2251]: I1213 14:06:54.727994 2251 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-1df240c4f3","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:06:54.728314 kubelet[2251]: I1213 14:06:54.728301 2251 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:06:54.728378 kubelet[2251]: I1213 14:06:54.728370 2251 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:06:54.728537 kubelet[2251]: I1213 14:06:54.728527 2251 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:06:54.729351 kubelet[2251]: I1213 14:06:54.729337 2251 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:06:54.729448 kubelet[2251]: I1213 14:06:54.729438 2251 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:06:54.729542 kubelet[2251]: I1213 14:06:54.729533 2251 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:06:54.729598 kubelet[2251]: I1213 14:06:54.729589 2251 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:06:54.732541 kubelet[2251]: W1213 14:06:54.732376 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1df240c4f3&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.732541 kubelet[2251]: E1213 14:06:54.732428 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1df240c4f3&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.732810 kubelet[2251]: W1213 14:06:54.732765 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.732881 kubelet[2251]: E1213 14:06:54.732821 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.732908 kubelet[2251]: I1213 14:06:54.732896 2251 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:06:54.733081 kubelet[2251]: I1213 14:06:54.733064 2251 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:06:54.733117 kubelet[2251]: W1213 14:06:54.733108 2251 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:06:54.733866 kubelet[2251]: I1213 14:06:54.733828 2251 server.go:1264] "Started kubelet" Dec 13 14:06:54.738254 kubelet[2251]: E1213 14:06:54.738148 2251 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.37:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.37:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-1df240c4f3.1810c1af31a26e47 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-1df240c4f3,UID:ci-3510.3.6-a-1df240c4f3,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-1df240c4f3,},FirstTimestamp:2024-12-13 14:06:54.733807175 +0000 UTC m=+0.599018581,LastTimestamp:2024-12-13 14:06:54.733807175 +0000 UTC m=+0.599018581,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-1df240c4f3,}" Dec 13 14:06:54.737000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.737000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:06:54.737000 audit[2251]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000593620 a1=4000594b70 a2=40005935f0 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.737000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:06:54.738000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:54.738000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:06:54.738000 audit[2251]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000abe4a0 a1=4000594b88 a2=40005936b0 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.738000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:06:54.739646 kubelet[2251]: I1213 14:06:54.739260 2251 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:06:54.739646 kubelet[2251]: I1213 14:06:54.739309 2251 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:06:54.739646 kubelet[2251]: I1213 14:06:54.739372 2251 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:06:54.742565 kubelet[2251]: I1213 14:06:54.742529 2251 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:06:54.743943 kubelet[2251]: I1213 14:06:54.743923 2251 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:06:54.744844 kubelet[2251]: I1213 14:06:54.744801 2251 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:06:54.745087 kubelet[2251]: I1213 14:06:54.745075 2251 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:06:54.745853 kubelet[2251]: I1213 14:06:54.745834 2251 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:06:54.746034 kubelet[2251]: I1213 14:06:54.746021 2251 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:06:54.746155 kubelet[2251]: I1213 14:06:54.746145 2251 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:06:54.746579 kubelet[2251]: W1213 14:06:54.746534 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.746685 kubelet[2251]: E1213 14:06:54.746674 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:54.746893 kubelet[2251]: E1213 14:06:54.746874 2251 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:06:54.745000 audit[2262]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:54.745000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb82ff40 a2=0 a3=1 items=0 ppid=2251 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.745000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:06:54.747625 kubelet[2251]: E1213 14:06:54.747598 2251 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1df240c4f3?timeout=10s\": dial tcp 10.200.20.37:6443: connect: connection refused" interval="200ms" Dec 13 14:06:54.746000 audit[2263]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:54.746000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0dc99f0 a2=0 a3=1 items=0 ppid=2251 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:06:54.748845 kubelet[2251]: I1213 14:06:54.748827 2251 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:06:54.749020 kubelet[2251]: I1213 14:06:54.749004 2251 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:06:54.750114 kubelet[2251]: I1213 14:06:54.750099 2251 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:06:54.749000 audit[2265]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:54.749000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff4001350 a2=0 a3=1 items=0 ppid=2251 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.749000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:06:54.750000 audit[2267]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:54.750000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd2848f60 a2=0 a3=1 items=0 ppid=2251 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:54.750000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:06:54.913564 kubelet[2251]: I1213 14:06:54.913528 2251 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:54.914575 kubelet[2251]: E1213 14:06:54.914550 2251 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:54.914766 kubelet[2251]: I1213 14:06:54.914748 2251 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:06:54.914766 kubelet[2251]: I1213 14:06:54.914765 2251 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:06:54.914826 kubelet[2251]: I1213 14:06:54.914785 2251 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:06:54.948790 kubelet[2251]: E1213 14:06:54.948748 2251 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1df240c4f3?timeout=10s\": dial tcp 10.200.20.37:6443: connect: connection refused" interval="400ms" Dec 13 14:06:55.118549 kubelet[2251]: I1213 14:06:55.116450 2251 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.118549 kubelet[2251]: E1213 14:06:55.117222 2251 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.349599 kubelet[2251]: E1213 14:06:55.349547 2251 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1df240c4f3?timeout=10s\": dial tcp 10.200.20.37:6443: connect: connection refused" interval="800ms" Dec 13 14:06:55.376646 kubelet[2251]: I1213 14:06:55.376313 2251 policy_none.go:49] "None policy: Start" Dec 13 14:06:55.377056 kubelet[2251]: I1213 14:06:55.377042 2251 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:06:55.377165 kubelet[2251]: I1213 14:06:55.377156 2251 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:06:55.384745 systemd[1]: Created slice kubepods.slice. Dec 13 14:06:55.389422 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:06:55.392234 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:06:55.399005 kubelet[2251]: I1213 14:06:55.398972 2251 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:06:55.397000 audit[2251]: AVC avc: denied { mac_admin } for pid=2251 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:55.397000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:06:55.397000 audit[2251]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bc4300 a1=4000a54e70 a2=4000bc4240 a3=25 items=0 ppid=1 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.397000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:06:55.399263 kubelet[2251]: I1213 14:06:55.399035 2251 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:06:55.399263 kubelet[2251]: I1213 14:06:55.399140 2251 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:06:55.399263 kubelet[2251]: I1213 14:06:55.399232 2251 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:06:55.401100 kubelet[2251]: E1213 14:06:55.400931 2251 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-1df240c4f3\" not found" Dec 13 14:06:55.477000 audit[2273]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:55.477000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffffa6ac3b0 a2=0 a3=1 items=0 ppid=2251 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:06:55.478742 kubelet[2251]: I1213 14:06:55.478684 2251 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:06:55.478000 audit[2274]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:06:55.478000 audit[2274]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe5cd2f60 a2=0 a3=1 items=0 ppid=2251 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:06:55.479807 kubelet[2251]: I1213 14:06:55.479769 2251 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:06:55.479807 kubelet[2251]: I1213 14:06:55.479805 2251 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:06:55.479878 kubelet[2251]: I1213 14:06:55.479828 2251 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:06:55.479878 kubelet[2251]: E1213 14:06:55.479867 2251 kubelet.go:2361] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:06:55.480460 kubelet[2251]: W1213 14:06:55.480436 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:55.480572 kubelet[2251]: E1213 14:06:55.480559 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:55.479000 audit[2276]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:55.479000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff42058a0 a2=0 a3=1 items=0 ppid=2251 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:06:55.480000 audit[2278]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:55.480000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdbd55c30 a2=0 a3=1 items=0 ppid=2251 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:06:55.481000 audit[2277]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:06:55.481000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe4b93d20 a2=0 a3=1 items=0 ppid=2251 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:06:55.482000 audit[2279]: NETFILTER_CFG table=filter:38 family=2 entries=1 op=nft_register_chain pid=2279 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:06:55.482000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd6dcf00 a2=0 a3=1 items=0 ppid=2251 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:06:55.482000 audit[2280]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:06:55.482000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcba248d0 a2=0 a3=1 items=0 ppid=2251 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:06:55.484000 audit[2281]: NETFILTER_CFG table=filter:40 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:06:55.484000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeb670d50 a2=0 a3=1 items=0 ppid=2251 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:55.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:06:55.519161 kubelet[2251]: I1213 14:06:55.519128 2251 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.519569 kubelet[2251]: E1213 14:06:55.519543 2251 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.580085 kubelet[2251]: I1213 14:06:55.580050 2251 topology_manager.go:215] "Topology Admit Handler" podUID="5d4bb22650e81a64e1481f10065c6645" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.581609 kubelet[2251]: I1213 14:06:55.581584 2251 topology_manager.go:215] "Topology Admit Handler" podUID="5b88d649ca2db560fd56782249585635" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.582918 kubelet[2251]: I1213 14:06:55.582898 2251 topology_manager.go:215] "Topology Admit Handler" podUID="61093103dcd719d16c5dfd601f361500" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.588217 systemd[1]: Created slice kubepods-burstable-pod5b88d649ca2db560fd56782249585635.slice. Dec 13 14:06:55.610646 systemd[1]: Created slice kubepods-burstable-pod5d4bb22650e81a64e1481f10065c6645.slice. Dec 13 14:06:55.620132 systemd[1]: Created slice kubepods-burstable-pod61093103dcd719d16c5dfd601f361500.slice. Dec 13 14:06:55.653480 kubelet[2251]: I1213 14:06:55.651736 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653480 kubelet[2251]: I1213 14:06:55.651781 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653480 kubelet[2251]: I1213 14:06:55.651801 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653480 kubelet[2251]: I1213 14:06:55.651824 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653480 kubelet[2251]: I1213 14:06:55.651842 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61093103dcd719d16c5dfd601f361500-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-1df240c4f3\" (UID: \"61093103dcd719d16c5dfd601f361500\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653703 kubelet[2251]: I1213 14:06:55.651858 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653703 kubelet[2251]: I1213 14:06:55.651872 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653703 kubelet[2251]: I1213 14:06:55.651886 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.653703 kubelet[2251]: I1213 14:06:55.651905 2251 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:55.749471 kubelet[2251]: W1213 14:06:55.749415 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:55.749471 kubelet[2251]: E1213 14:06:55.749476 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.37:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:55.910106 env[1493]: time="2024-12-13T14:06:55.909473353Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-1df240c4f3,Uid:5b88d649ca2db560fd56782249585635,Namespace:kube-system,Attempt:0,}" Dec 13 14:06:55.919313 env[1493]: time="2024-12-13T14:06:55.919252681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-1df240c4f3,Uid:5d4bb22650e81a64e1481f10065c6645,Namespace:kube-system,Attempt:0,}" Dec 13 14:06:55.923325 env[1493]: time="2024-12-13T14:06:55.923293901Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-1df240c4f3,Uid:61093103dcd719d16c5dfd601f361500,Namespace:kube-system,Attempt:0,}" Dec 13 14:06:55.967709 kubelet[2251]: W1213 14:06:55.967647 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:55.967709 kubelet[2251]: E1213 14:06:55.967712 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.37:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.150857 kubelet[2251]: E1213 14:06:56.150797 2251 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.37:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-1df240c4f3?timeout=10s\": dial tcp 10.200.20.37:6443: connect: connection refused" interval="1.6s" Dec 13 14:06:56.167891 kubelet[2251]: W1213 14:06:56.167483 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1df240c4f3&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.167891 kubelet[2251]: E1213 14:06:56.167550 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.37:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-1df240c4f3&limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.304605 kubelet[2251]: W1213 14:06:56.304545 2251 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.304605 kubelet[2251]: E1213 14:06:56.304585 2251 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.37:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.322289 kubelet[2251]: I1213 14:06:56.321983 2251 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:56.322425 kubelet[2251]: E1213 14:06:56.322287 2251 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.20.37:6443/api/v1/nodes\": dial tcp 10.200.20.37:6443: connect: connection refused" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:56.558403 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount434851991.mount: Deactivated successfully. Dec 13 14:06:56.588001 env[1493]: time="2024-12-13T14:06:56.587960782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.606516 env[1493]: time="2024-12-13T14:06:56.606470271Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.612639 env[1493]: time="2024-12-13T14:06:56.612586540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.614783 env[1493]: time="2024-12-13T14:06:56.614746111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.618714 env[1493]: time="2024-12-13T14:06:56.618687450Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.621446 env[1493]: time="2024-12-13T14:06:56.621419823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.627559 env[1493]: time="2024-12-13T14:06:56.627531692Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.630719 env[1493]: time="2024-12-13T14:06:56.630693827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.637264 env[1493]: time="2024-12-13T14:06:56.637239219Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.644768 env[1493]: time="2024-12-13T14:06:56.644736135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.652837 env[1493]: time="2024-12-13T14:06:56.652803773Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.668445 env[1493]: time="2024-12-13T14:06:56.668408808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:06:56.683669 env[1493]: time="2024-12-13T14:06:56.683571321Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:06:56.683831 env[1493]: time="2024-12-13T14:06:56.683612161Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:06:56.683902 env[1493]: time="2024-12-13T14:06:56.683816922Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:06:56.684086 env[1493]: time="2024-12-13T14:06:56.684043963Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4 pid=2289 runtime=io.containerd.runc.v2 Dec 13 14:06:56.706235 systemd[1]: Started cri-containerd-9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4.scope. Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.721000 audit: BPF prog-id=56 op=LOAD Dec 13 14:06:56.721000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.721000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2289 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333835653730653962656366353364383733366439376635643363 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2289 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333835653730653962656366353364383733366439376635643363 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit: BPF prog-id=57 op=LOAD Dec 13 14:06:56.722000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2289 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333835653730653962656366353364383733366439376635643363 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.722000 audit: BPF prog-id=58 op=LOAD Dec 13 14:06:56.722000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2289 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333835653730653962656366353364383733366439376635643363 Dec 13 14:06:56.723000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:06:56.723000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { perfmon } for pid=2300 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit[2300]: AVC avc: denied { bpf } for pid=2300 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.723000 audit: BPF prog-id=59 op=LOAD Dec 13 14:06:56.723000 audit[2300]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2289 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.723000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3963333835653730653962656366353364383733366439376635643363 Dec 13 14:06:56.739627 env[1493]: time="2024-12-13T14:06:56.739150308Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:06:56.739823 env[1493]: time="2024-12-13T14:06:56.739590470Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:06:56.739914 env[1493]: time="2024-12-13T14:06:56.739810071Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:06:56.740127 env[1493]: time="2024-12-13T14:06:56.740080032Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a8102620c1b2b3f9f0b6e5b6ddac55c752a9e7c8154fe742ac09dadfa340acec pid=2329 runtime=io.containerd.runc.v2 Dec 13 14:06:56.741391 env[1493]: time="2024-12-13T14:06:56.741332718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:06:56.741478 env[1493]: time="2024-12-13T14:06:56.741396119Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:06:56.741478 env[1493]: time="2024-12-13T14:06:56.741423079Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:06:56.746058 env[1493]: time="2024-12-13T14:06:56.745982581Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/016304dfa4a2a23bdc729c62436c869bc62d7531295ba0b2d3efe509acbae02d pid=2332 runtime=io.containerd.runc.v2 Dec 13 14:06:56.749498 env[1493]: time="2024-12-13T14:06:56.749458477Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-1df240c4f3,Uid:5b88d649ca2db560fd56782249585635,Namespace:kube-system,Attempt:0,} returns sandbox id \"9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4\"" Dec 13 14:06:56.753631 env[1493]: time="2024-12-13T14:06:56.753515497Z" level=info msg="CreateContainer within sandbox \"9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:06:56.756520 systemd[1]: Started cri-containerd-a8102620c1b2b3f9f0b6e5b6ddac55c752a9e7c8154fe742ac09dadfa340acec.scope. Dec 13 14:06:56.766695 systemd[1]: Started cri-containerd-016304dfa4a2a23bdc729c62436c869bc62d7531295ba0b2d3efe509acbae02d.scope. Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.776000 audit: BPF prog-id=60 op=LOAD Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2332 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363330346466613461326132336264633732396336323433366338 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2332 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363330346466613461326132336264633732396336323433366338 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit: BPF prog-id=61 op=LOAD Dec 13 14:06:56.777000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2332 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363330346466613461326132336264633732396336323433366338 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.777000 audit: BPF prog-id=62 op=LOAD Dec 13 14:06:56.777000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2332 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363330346466613461326132336264633732396336323433366338 Dec 13 14:06:56.778000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:06:56.778000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { perfmon } for pid=2362 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit[2362]: AVC avc: denied { bpf } for pid=2362 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.778000 audit: BPF prog-id=63 op=LOAD Dec 13 14:06:56.778000 audit[2362]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2332 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363330346466613461326132336264633732396336323433366338 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit: BPF prog-id=64 op=LOAD Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2329 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032363230633162326233663966306236653562366464616335 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2329 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032363230633162326233663966306236653562366464616335 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit: BPF prog-id=65 op=LOAD Dec 13 14:06:56.783000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2329 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032363230633162326233663966306236653562366464616335 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit: BPF prog-id=66 op=LOAD Dec 13 14:06:56.783000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2329 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032363230633162326233663966306236653562366464616335 Dec 13 14:06:56.783000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:06:56.783000 audit: BPF prog-id=65 op=UNLOAD Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { perfmon } for pid=2354 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit[2354]: AVC avc: denied { bpf } for pid=2354 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.783000 audit: BPF prog-id=67 op=LOAD Dec 13 14:06:56.783000 audit[2354]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2329 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138313032363230633162326233663966306236653562366464616335 Dec 13 14:06:56.805670 env[1493]: time="2024-12-13T14:06:56.804503022Z" level=info msg="CreateContainer within sandbox \"9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"ad312a3fc7e7527004fcadc0cb98ac763e04d8ae593c95d72de6bcf52db7221c\"" Dec 13 14:06:56.806403 env[1493]: time="2024-12-13T14:06:56.806377351Z" level=info msg="StartContainer for \"ad312a3fc7e7527004fcadc0cb98ac763e04d8ae593c95d72de6bcf52db7221c\"" Dec 13 14:06:56.810713 env[1493]: time="2024-12-13T14:06:56.810603611Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-1df240c4f3,Uid:61093103dcd719d16c5dfd601f361500,Namespace:kube-system,Attempt:0,} returns sandbox id \"a8102620c1b2b3f9f0b6e5b6ddac55c752a9e7c8154fe742ac09dadfa340acec\"" Dec 13 14:06:56.820467 env[1493]: time="2024-12-13T14:06:56.820423698Z" level=info msg="CreateContainer within sandbox \"a8102620c1b2b3f9f0b6e5b6ddac55c752a9e7c8154fe742ac09dadfa340acec\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:06:56.825879 env[1493]: time="2024-12-13T14:06:56.825832044Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-1df240c4f3,Uid:5d4bb22650e81a64e1481f10065c6645,Namespace:kube-system,Attempt:0,} returns sandbox id \"016304dfa4a2a23bdc729c62436c869bc62d7531295ba0b2d3efe509acbae02d\"" Dec 13 14:06:56.828638 env[1493]: time="2024-12-13T14:06:56.828604497Z" level=info msg="CreateContainer within sandbox \"016304dfa4a2a23bdc729c62436c869bc62d7531295ba0b2d3efe509acbae02d\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:06:56.836238 systemd[1]: Started cri-containerd-ad312a3fc7e7527004fcadc0cb98ac763e04d8ae593c95d72de6bcf52db7221c.scope. Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit: BPF prog-id=68 op=LOAD Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2289 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333132613366633765373532373030346663616463306362393861 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2289 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333132613366633765373532373030346663616463306362393861 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.848000 audit: BPF prog-id=69 op=LOAD Dec 13 14:06:56.848000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2289 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333132613366633765373532373030346663616463306362393861 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit: BPF prog-id=70 op=LOAD Dec 13 14:06:56.849000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2289 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333132613366633765373532373030346663616463306362393861 Dec 13 14:06:56.849000 audit: BPF prog-id=70 op=UNLOAD Dec 13 14:06:56.849000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { perfmon } for pid=2413 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit[2413]: AVC avc: denied { bpf } for pid=2413 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.849000 audit: BPF prog-id=71 op=LOAD Dec 13 14:06:56.849000 audit[2413]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2289 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164333132613366633765373532373030346663616463306362393861 Dec 13 14:06:56.871212 kubelet[2251]: E1213 14:06:56.871165 2251 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.37:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.37:6443: connect: connection refused Dec 13 14:06:56.871757 env[1493]: time="2024-12-13T14:06:56.871719224Z" level=info msg="CreateContainer within sandbox \"a8102620c1b2b3f9f0b6e5b6ddac55c752a9e7c8154fe742ac09dadfa340acec\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bf5e0188fbac1555a7afa669d8267abc62adaab8f219ffeeb236274edb7ad79b\"" Dec 13 14:06:56.872456 env[1493]: time="2024-12-13T14:06:56.872423708Z" level=info msg="StartContainer for \"bf5e0188fbac1555a7afa669d8267abc62adaab8f219ffeeb236274edb7ad79b\"" Dec 13 14:06:56.885899 env[1493]: time="2024-12-13T14:06:56.885854132Z" level=info msg="StartContainer for \"ad312a3fc7e7527004fcadc0cb98ac763e04d8ae593c95d72de6bcf52db7221c\" returns successfully" Dec 13 14:06:56.893764 systemd[1]: Started cri-containerd-bf5e0188fbac1555a7afa669d8267abc62adaab8f219ffeeb236274edb7ad79b.scope. Dec 13 14:06:56.897554 env[1493]: time="2024-12-13T14:06:56.897363107Z" level=info msg="CreateContainer within sandbox \"016304dfa4a2a23bdc729c62436c869bc62d7531295ba0b2d3efe509acbae02d\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2935e4c827d50c2769ea9e1f6977ec5a1393c6ade8b16181f682f3aa7ab664eb\"" Dec 13 14:06:56.900020 env[1493]: time="2024-12-13T14:06:56.898255432Z" level=info msg="StartContainer for \"2935e4c827d50c2769ea9e1f6977ec5a1393c6ade8b16181f682f3aa7ab664eb\"" Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit: BPF prog-id=72 op=LOAD Dec 13 14:06:56.911000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.911000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266356530313838666261633135353561376166613636396438323637 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266356530313838666261633135353561376166613636396438323637 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit: BPF prog-id=73 op=LOAD Dec 13 14:06:56.912000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266356530313838666261633135353561376166613636396438323637 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit: BPF prog-id=74 op=LOAD Dec 13 14:06:56.912000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266356530313838666261633135353561376166613636396438323637 Dec 13 14:06:56.912000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:06:56.912000 audit: BPF prog-id=73 op=UNLOAD Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.912000 audit: BPF prog-id=75 op=LOAD Dec 13 14:06:56.912000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2329 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266356530313838666261633135353561376166613636396438323637 Dec 13 14:06:56.922577 systemd[1]: Started cri-containerd-2935e4c827d50c2769ea9e1f6977ec5a1393c6ade8b16181f682f3aa7ab664eb.scope. Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.939000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit: BPF prog-id=76 op=LOAD Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2332 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333565346338323764353063323736396561396531663639373765 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2332 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333565346338323764353063323736396561396531663639373765 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit: BPF prog-id=77 op=LOAD Dec 13 14:06:56.940000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2332 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333565346338323764353063323736396561396531663639373765 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit: BPF prog-id=78 op=LOAD Dec 13 14:06:56.940000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2332 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333565346338323764353063323736396561396531663639373765 Dec 13 14:06:56.940000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:06:56.940000 audit: BPF prog-id=77 op=UNLOAD Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { perfmon } for pid=2477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit[2477]: AVC avc: denied { bpf } for pid=2477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:06:56.940000 audit: BPF prog-id=79 op=LOAD Dec 13 14:06:56.940000 audit[2477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2332 pid=2477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:56.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239333565346338323764353063323736396561396531663639373765 Dec 13 14:06:56.956964 env[1493]: time="2024-12-13T14:06:56.956908153Z" level=info msg="StartContainer for \"bf5e0188fbac1555a7afa669d8267abc62adaab8f219ffeeb236274edb7ad79b\" returns successfully" Dec 13 14:06:56.972775 env[1493]: time="2024-12-13T14:06:56.972712949Z" level=info msg="StartContainer for \"2935e4c827d50c2769ea9e1f6977ec5a1393c6ade8b16181f682f3aa7ab664eb\" returns successfully" Dec 13 14:06:57.560542 systemd[1]: run-containerd-runc-k8s.io-9c385e70e9becf53d8736d97f5d3c78f7d63e9d7ea2eba9de8886308c111e9c4-runc.ObNMmR.mount: Deactivated successfully. Dec 13 14:06:57.923877 kubelet[2251]: I1213 14:06:57.923789 2251 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:59.126000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.133187 kernel: kauditd_printk_skb: 561 callbacks suppressed Dec 13 14:06:59.133322 kernel: audit: type=1400 audit(1734098819.126:569): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.126000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40044640c0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.191395 kernel: audit: type=1300 audit(1734098819.126:569): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40044640c0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.222715 kernel: audit: type=1327 audit(1734098819.126:569): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.126000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.252814 kernel: audit: type=1400 audit(1734098819.126:570): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.126000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4002825060 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.283335 kernel: audit: type=1300 audit(1734098819.126:570): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4002825060 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.306812 kernel: audit: type=1327 audit(1734098819.126:570): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.126000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.328921 kernel: audit: type=1400 audit(1734098819.126:571): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.126000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40044642d0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.357580 kernel: audit: type=1300 audit(1734098819.126:571): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=40044642d0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.126000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.382245 kernel: audit: type=1327 audit(1734098819.126:571): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.141000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.406044 kubelet[2251]: E1213 14:06:59.391064 2251 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-1df240c4f3\" not found" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:59.141000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=50 a1=40073f61e0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.141000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.321000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.321000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=4004785240 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.321000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.321000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=43 a1=400400b9b0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:06:59.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:06:59.407300 kernel: audit: type=1400 audit(1734098819.141:572): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.514921 kubelet[2251]: I1213 14:06:59.514878 2251 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:06:59.612000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.612000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006a0c60 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:06:59.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:06:59.612000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:06:59.612000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000e0a600 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:06:59.612000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:06:59.735742 kubelet[2251]: I1213 14:06:59.735708 2251 apiserver.go:52] "Watching apiserver" Dec 13 14:06:59.746344 kubelet[2251]: I1213 14:06:59.746313 2251 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:06:59.863442 kubelet[2251]: E1213 14:06:59.863399 2251 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.6-a-1df240c4f3\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:00.302369 kubelet[2251]: W1213 14:07:00.302330 2251 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:01.641738 systemd[1]: Reloading. Dec 13 14:07:01.704955 /usr/lib/systemd/system-generators/torcx-generator[2540]: time="2024-12-13T14:07:01Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:07:01.704986 /usr/lib/systemd/system-generators/torcx-generator[2540]: time="2024-12-13T14:07:01Z" level=info msg="torcx already run" Dec 13 14:07:01.783763 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:07:01.783941 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:07:01.801209 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.887000 audit: BPF prog-id=80 op=LOAD Dec 13 14:07:01.887000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.888000 audit: BPF prog-id=81 op=LOAD Dec 13 14:07:01.889000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.889000 audit: BPF prog-id=82 op=LOAD Dec 13 14:07:01.889000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit: BPF prog-id=83 op=LOAD Dec 13 14:07:01.891000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit: BPF prog-id=84 op=LOAD Dec 13 14:07:01.892000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit: BPF prog-id=85 op=LOAD Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit: BPF prog-id=86 op=LOAD Dec 13 14:07:01.892000 audit: BPF prog-id=45 op=UNLOAD Dec 13 14:07:01.892000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.892000 audit: BPF prog-id=87 op=LOAD Dec 13 14:07:01.892000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit: BPF prog-id=88 op=LOAD Dec 13 14:07:01.894000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit: BPF prog-id=89 op=LOAD Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.894000 audit: BPF prog-id=90 op=LOAD Dec 13 14:07:01.894000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:07:01.894000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.896000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit: BPF prog-id=91 op=LOAD Dec 13 14:07:01.897000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit: BPF prog-id=92 op=LOAD Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit: BPF prog-id=93 op=LOAD Dec 13 14:07:01.897000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:07:01.897000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit: BPF prog-id=94 op=LOAD Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.897000 audit: BPF prog-id=95 op=LOAD Dec 13 14:07:01.897000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:07:01.897000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit: BPF prog-id=96 op=LOAD Dec 13 14:07:01.898000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.898000 audit: BPF prog-id=97 op=LOAD Dec 13 14:07:01.898000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit: BPF prog-id=98 op=LOAD Dec 13 14:07:01.900000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.900000 audit: BPF prog-id=99 op=LOAD Dec 13 14:07:01.900000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:01.901000 audit: BPF prog-id=100 op=LOAD Dec 13 14:07:01.901000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:07:01.916872 systemd[1]: Stopping kubelet.service... Dec 13 14:07:01.938594 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:07:01.938786 systemd[1]: Stopped kubelet.service. Dec 13 14:07:01.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:01.940991 systemd[1]: Starting kubelet.service... Dec 13 14:07:02.110527 systemd[1]: Started kubelet.service. Dec 13 14:07:02.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:02.177517 kubelet[2604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:02.177517 kubelet[2604]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:07:02.177517 kubelet[2604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:02.181720 kubelet[2604]: I1213 14:07:02.177500 2604 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:07:02.186416 kubelet[2604]: I1213 14:07:02.186384 2604 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" Dec 13 14:07:02.186602 kubelet[2604]: I1213 14:07:02.186591 2604 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:07:02.186978 kubelet[2604]: I1213 14:07:02.186962 2604 server.go:927] "Client rotation is on, will bootstrap in background" Dec 13 14:07:02.189643 kubelet[2604]: I1213 14:07:02.189612 2604 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:07:02.190908 kubelet[2604]: I1213 14:07:02.190883 2604 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:07:02.196425 kubelet[2604]: I1213 14:07:02.196405 2604 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:07:02.196599 kubelet[2604]: I1213 14:07:02.196569 2604 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:07:02.196763 kubelet[2604]: I1213 14:07:02.196596 2604 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-1df240c4f3","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 14:07:02.196837 kubelet[2604]: I1213 14:07:02.196767 2604 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:07:02.196837 kubelet[2604]: I1213 14:07:02.196776 2604 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 14:07:02.196837 kubelet[2604]: I1213 14:07:02.196809 2604 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:02.196914 kubelet[2604]: I1213 14:07:02.196899 2604 kubelet.go:400] "Attempting to sync node with API server" Dec 13 14:07:02.196914 kubelet[2604]: I1213 14:07:02.196909 2604 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:07:02.196963 kubelet[2604]: I1213 14:07:02.196932 2604 kubelet.go:312] "Adding apiserver pod source" Dec 13 14:07:02.196963 kubelet[2604]: I1213 14:07:02.196949 2604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:07:02.202000 audit[2604]: AVC avc: denied { mac_admin } for pid=2604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.201567 2604 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.201727 2604 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.202099 2604 server.go:1264] "Started kubelet" Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.205132 2604 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.205375 2604 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:07:02.208930 kubelet[2604]: I1213 14:07:02.205413 2604 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:07:02.202000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:02.202000 audit[2604]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ba92f0 a1=4000833f38 a2=4000ba92c0 a3=25 items=0 ppid=1 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:02.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:02.211561 kubelet[2604]: I1213 14:07:02.211539 2604 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:07:02.210000 audit[2604]: AVC avc: denied { mac_admin } for pid=2604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:02.210000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:02.210000 audit[2604]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b82800 a1=4000833f50 a2=4000ba9380 a3=25 items=0 ppid=1 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:02.210000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:02.211784 kubelet[2604]: I1213 14:07:02.211625 2604 server.go:455] "Adding debug handlers to kubelet server" Dec 13 14:07:02.211833 kubelet[2604]: I1213 14:07:02.211817 2604 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:07:02.211901 kubelet[2604]: I1213 14:07:02.211892 2604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:07:02.221772 kubelet[2604]: I1213 14:07:02.221749 2604 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 14:07:02.222886 kubelet[2604]: I1213 14:07:02.222862 2604 desired_state_of_world_populator.go:149] "Desired state populator starts to run" Dec 13 14:07:02.223123 kubelet[2604]: I1213 14:07:02.223112 2604 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:07:02.235122 kubelet[2604]: I1213 14:07:02.235093 2604 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:07:02.235425 kubelet[2604]: I1213 14:07:02.235404 2604 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:07:02.241953 kubelet[2604]: I1213 14:07:02.241931 2604 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:07:02.247555 kubelet[2604]: I1213 14:07:02.247510 2604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:07:02.248778 kubelet[2604]: I1213 14:07:02.248459 2604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:07:02.248778 kubelet[2604]: I1213 14:07:02.248498 2604 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:07:02.248778 kubelet[2604]: I1213 14:07:02.248518 2604 kubelet.go:2337] "Starting kubelet main sync loop" Dec 13 14:07:02.249043 kubelet[2604]: E1213 14:07:02.248715 2604 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:07:02.255738 kubelet[2604]: E1213 14:07:02.255711 2604 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:07:02.285023 kubelet[2604]: I1213 14:07:02.284983 2604 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:07:02.285023 kubelet[2604]: I1213 14:07:02.285008 2604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:07:02.285023 kubelet[2604]: I1213 14:07:02.285030 2604 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:02.285204 kubelet[2604]: I1213 14:07:02.285178 2604 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:07:02.285204 kubelet[2604]: I1213 14:07:02.285189 2604 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:07:02.285258 kubelet[2604]: I1213 14:07:02.285208 2604 policy_none.go:49] "None policy: Start" Dec 13 14:07:02.285913 kubelet[2604]: I1213 14:07:02.285893 2604 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:07:02.285950 kubelet[2604]: I1213 14:07:02.285921 2604 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:07:02.286102 kubelet[2604]: I1213 14:07:02.286084 2604 state_mem.go:75] "Updated machine memory state" Dec 13 14:07:02.289754 kubelet[2604]: I1213 14:07:02.289735 2604 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:07:02.288000 audit[2604]: AVC avc: denied { mac_admin } for pid=2604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:02.288000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:02.288000 audit[2604]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400101e4b0 a1=4001015098 a2=400101e480 a3=25 items=0 ppid=1 pid=2604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:02.288000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:02.290857 kubelet[2604]: I1213 14:07:02.290837 2604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:07:02.291163 kubelet[2604]: I1213 14:07:02.291133 2604 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:07:02.291533 kubelet[2604]: I1213 14:07:02.291521 2604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:07:02.324916 kubelet[2604]: I1213 14:07:02.324890 2604 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.335665 kubelet[2604]: I1213 14:07:02.335625 2604 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.335801 kubelet[2604]: I1213 14:07:02.335737 2604 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.349260 kubelet[2604]: I1213 14:07:02.349218 2604 topology_manager.go:215] "Topology Admit Handler" podUID="61093103dcd719d16c5dfd601f361500" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.349398 kubelet[2604]: I1213 14:07:02.349351 2604 topology_manager.go:215] "Topology Admit Handler" podUID="5d4bb22650e81a64e1481f10065c6645" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.349398 kubelet[2604]: I1213 14:07:02.349395 2604 topology_manager.go:215] "Topology Admit Handler" podUID="5b88d649ca2db560fd56782249585635" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.357145 kubelet[2604]: W1213 14:07:02.357113 2604 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:02.360289 kubelet[2604]: W1213 14:07:02.360245 2604 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:02.361077 kubelet[2604]: W1213 14:07:02.361052 2604 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:02.361144 kubelet[2604]: E1213 14:07:02.361101 2604 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424759 kubelet[2604]: I1213 14:07:02.424724 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424890 kubelet[2604]: I1213 14:07:02.424770 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424890 kubelet[2604]: I1213 14:07:02.424790 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424890 kubelet[2604]: I1213 14:07:02.424808 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424890 kubelet[2604]: I1213 14:07:02.424822 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.424890 kubelet[2604]: I1213 14:07:02.424849 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61093103dcd719d16c5dfd601f361500-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-1df240c4f3\" (UID: \"61093103dcd719d16c5dfd601f361500\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.425021 kubelet[2604]: I1213 14:07:02.424864 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.425021 kubelet[2604]: I1213 14:07:02.424879 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/5d4bb22650e81a64e1481f10065c6645-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-1df240c4f3\" (UID: \"5d4bb22650e81a64e1481f10065c6645\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:02.425021 kubelet[2604]: I1213 14:07:02.424894 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/5b88d649ca2db560fd56782249585635-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-1df240c4f3\" (UID: \"5b88d649ca2db560fd56782249585635\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:03.198154 kubelet[2604]: I1213 14:07:03.198108 2604 apiserver.go:52] "Watching apiserver" Dec 13 14:07:03.224140 kubelet[2604]: I1213 14:07:03.224096 2604 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" Dec 13 14:07:03.324356 kubelet[2604]: I1213 14:07:03.324292 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-1df240c4f3" podStartSLOduration=1.324262311 podStartE2EDuration="1.324262311s" podCreationTimestamp="2024-12-13 14:07:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:03.306304318 +0000 UTC m=+1.189738404" watchObservedRunningTime="2024-12-13 14:07:03.324262311 +0000 UTC m=+1.207696437" Dec 13 14:07:03.324566 kubelet[2604]: I1213 14:07:03.324421 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-1df240c4f3" podStartSLOduration=1.324415712 podStartE2EDuration="1.324415712s" podCreationTimestamp="2024-12-13 14:07:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:03.32384539 +0000 UTC m=+1.207279516" watchObservedRunningTime="2024-12-13 14:07:03.324415712 +0000 UTC m=+1.207849798" Dec 13 14:07:03.385433 kubelet[2604]: I1213 14:07:03.385369 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-1df240c4f3" podStartSLOduration=3.38535004 podStartE2EDuration="3.38535004s" podCreationTimestamp="2024-12-13 14:07:00 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:03.3508631 +0000 UTC m=+1.234297226" watchObservedRunningTime="2024-12-13 14:07:03.38535004 +0000 UTC m=+1.268784166" Dec 13 14:07:04.410000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:07:04.417229 kernel: kauditd_printk_skb: 272 callbacks suppressed Dec 13 14:07:04.417392 kernel: audit: type=1400 audit(1734098824.410:826): avc: denied { watch } for pid=2426 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:07:04.410000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000be2400 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:04.480946 kernel: audit: type=1300 audit(1734098824.410:826): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000be2400 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:04.410000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:04.516522 kernel: audit: type=1327 audit(1734098824.410:826): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:07.352189 sudo[1897]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:07.351000 audit[1897]: USER_END pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.351000 audit[1897]: CRED_DISP pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.395210 kernel: audit: type=1106 audit(1734098827.351:827): pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.395345 kernel: audit: type=1104 audit(1734098827.351:828): pid=1897 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.453639 sshd[1894]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:07.453000 audit[1894]: USER_END pid=1894 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:07.482526 systemd[1]: sshd@6-10.200.20.37:22-10.200.16.10:35886.service: Deactivated successfully. Dec 13 14:07:07.454000 audit[1894]: CRED_DISP pid=1894 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:07.483353 kernel: audit: type=1106 audit(1734098827.453:829): pid=1894 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:07.483296 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:07:07.483468 systemd[1]: session-9.scope: Consumed 8.089s CPU time. Dec 13 14:07:07.505947 systemd-logind[1461]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:07:07.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.37:22-10.200.16.10:35886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.528396 kernel: audit: type=1104 audit(1734098827.454:830): pid=1894 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:07.528539 kernel: audit: type=1131 audit(1734098827.481:831): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.37:22-10.200.16.10:35886 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:07.529571 systemd-logind[1461]: Removed session 9. Dec 13 14:07:16.722000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.722000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ed4d00 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.781693 kernel: audit: type=1400 audit(1734098836.722:832): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.781838 kernel: audit: type=1300 audit(1734098836.722:832): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ed4d00 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.809328 kernel: audit: type=1327 audit(1734098836.722:832): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.723000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.834721 kernel: audit: type=1400 audit(1734098836.723:833): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.723000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ed4ec0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.867561 kernel: audit: type=1300 audit(1734098836.723:833): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000ed4ec0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.723000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.896085 kernel: audit: type=1327 audit(1734098836.723:833): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.734000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.922384 kernel: audit: type=1400 audit(1734098836.734:834): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.734000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ec3a0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.953610 kernel: audit: type=1300 audit(1734098836.734:834): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ec3a0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.979315 kernel: audit: type=1327 audit(1734098836.734:834): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:16.979497 kernel: audit: type=1400 audit(1734098836.734:835): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.734000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:16.734000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010ec400 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:16.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:17.244359 kubelet[2604]: I1213 14:07:17.244242 2604 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:07:17.245209 env[1493]: time="2024-12-13T14:07:17.245171134Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:07:17.245770 kubelet[2604]: I1213 14:07:17.245745 2604 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:07:17.848521 kubelet[2604]: I1213 14:07:17.848477 2604 topology_manager.go:215] "Topology Admit Handler" podUID="c2706e24-3af5-4a46-b041-fba4afdd6c7b" podNamespace="kube-system" podName="kube-proxy-nzfxn" Dec 13 14:07:17.853728 systemd[1]: Created slice kubepods-besteffort-podc2706e24_3af5_4a46_b041_fba4afdd6c7b.slice. Dec 13 14:07:18.016293 kubelet[2604]: I1213 14:07:18.016238 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/c2706e24-3af5-4a46-b041-fba4afdd6c7b-kube-proxy\") pod \"kube-proxy-nzfxn\" (UID: \"c2706e24-3af5-4a46-b041-fba4afdd6c7b\") " pod="kube-system/kube-proxy-nzfxn" Dec 13 14:07:18.016497 kubelet[2604]: I1213 14:07:18.016484 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c2706e24-3af5-4a46-b041-fba4afdd6c7b-xtables-lock\") pod \"kube-proxy-nzfxn\" (UID: \"c2706e24-3af5-4a46-b041-fba4afdd6c7b\") " pod="kube-system/kube-proxy-nzfxn" Dec 13 14:07:18.016604 kubelet[2604]: I1213 14:07:18.016592 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c2706e24-3af5-4a46-b041-fba4afdd6c7b-lib-modules\") pod \"kube-proxy-nzfxn\" (UID: \"c2706e24-3af5-4a46-b041-fba4afdd6c7b\") " pod="kube-system/kube-proxy-nzfxn" Dec 13 14:07:18.016705 kubelet[2604]: I1213 14:07:18.016691 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vwdtm\" (UniqueName: \"kubernetes.io/projected/c2706e24-3af5-4a46-b041-fba4afdd6c7b-kube-api-access-vwdtm\") pod \"kube-proxy-nzfxn\" (UID: \"c2706e24-3af5-4a46-b041-fba4afdd6c7b\") " pod="kube-system/kube-proxy-nzfxn" Dec 13 14:07:18.125651 kubelet[2604]: E1213 14:07:18.125544 2604 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Dec 13 14:07:18.125651 kubelet[2604]: E1213 14:07:18.125577 2604 projected.go:200] Error preparing data for projected volume kube-api-access-vwdtm for pod kube-system/kube-proxy-nzfxn: configmap "kube-root-ca.crt" not found Dec 13 14:07:18.125651 kubelet[2604]: E1213 14:07:18.125636 2604 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/c2706e24-3af5-4a46-b041-fba4afdd6c7b-kube-api-access-vwdtm podName:c2706e24-3af5-4a46-b041-fba4afdd6c7b nodeName:}" failed. No retries permitted until 2024-12-13 14:07:18.625614896 +0000 UTC m=+16.509049022 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-vwdtm" (UniqueName: "kubernetes.io/projected/c2706e24-3af5-4a46-b041-fba4afdd6c7b-kube-api-access-vwdtm") pod "kube-proxy-nzfxn" (UID: "c2706e24-3af5-4a46-b041-fba4afdd6c7b") : configmap "kube-root-ca.crt" not found Dec 13 14:07:18.331066 kubelet[2604]: I1213 14:07:18.331016 2604 topology_manager.go:215] "Topology Admit Handler" podUID="e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6" podNamespace="tigera-operator" podName="tigera-operator-7bc55997bb-g7z8k" Dec 13 14:07:18.337482 systemd[1]: Created slice kubepods-besteffort-pode9c5c4d9_8ca9_4f82_aeb4_6977eda2b2e6.slice. Dec 13 14:07:18.419082 kubelet[2604]: I1213 14:07:18.418972 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7jqbt\" (UniqueName: \"kubernetes.io/projected/e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6-kube-api-access-7jqbt\") pod \"tigera-operator-7bc55997bb-g7z8k\" (UID: \"e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6\") " pod="tigera-operator/tigera-operator-7bc55997bb-g7z8k" Dec 13 14:07:18.419468 kubelet[2604]: I1213 14:07:18.419440 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6-var-lib-calico\") pod \"tigera-operator-7bc55997bb-g7z8k\" (UID: \"e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6\") " pod="tigera-operator/tigera-operator-7bc55997bb-g7z8k" Dec 13 14:07:18.642478 env[1493]: time="2024-12-13T14:07:18.642012620Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-g7z8k,Uid:e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:07:18.691615 env[1493]: time="2024-12-13T14:07:18.691334285Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:18.691615 env[1493]: time="2024-12-13T14:07:18.691415646Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:18.691615 env[1493]: time="2024-12-13T14:07:18.691441526Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:18.691876 env[1493]: time="2024-12-13T14:07:18.691827727Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3 pid=2690 runtime=io.containerd.runc.v2 Dec 13 14:07:18.709790 systemd[1]: Started cri-containerd-a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3.scope. Dec 13 14:07:18.711392 systemd[1]: run-containerd-runc-k8s.io-a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3-runc.4oswHg.mount: Deactivated successfully. Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.727000 audit: BPF prog-id=101 op=LOAD Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2690 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132633239666433656639613064643432373931373834653562326332 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2690 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132633239666433656639613064643432373931373834653562326332 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.728000 audit: BPF prog-id=102 op=LOAD Dec 13 14:07:18.728000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2690 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132633239666433656639613064643432373931373834653562326332 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.729000 audit: BPF prog-id=103 op=LOAD Dec 13 14:07:18.729000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2690 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132633239666433656639613064643432373931373834653562326332 Dec 13 14:07:18.730000 audit: BPF prog-id=103 op=UNLOAD Dec 13 14:07:18.730000 audit: BPF prog-id=102 op=UNLOAD Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { perfmon } for pid=2701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit[2701]: AVC avc: denied { bpf } for pid=2701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.730000 audit: BPF prog-id=104 op=LOAD Dec 13 14:07:18.730000 audit[2701]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2690 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.730000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132633239666433656639613064643432373931373834653562326332 Dec 13 14:07:18.750985 env[1493]: time="2024-12-13T14:07:18.750925981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7bc55997bb-g7z8k,Uid:e9c5c4d9-8ca9-4f82-aeb4-6977eda2b2e6,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3\"" Dec 13 14:07:18.753622 env[1493]: time="2024-12-13T14:07:18.753492429Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:07:18.765113 env[1493]: time="2024-12-13T14:07:18.765073983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nzfxn,Uid:c2706e24-3af5-4a46-b041-fba4afdd6c7b,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:18.806470 env[1493]: time="2024-12-13T14:07:18.806383945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:18.806470 env[1493]: time="2024-12-13T14:07:18.806426705Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:18.806755 env[1493]: time="2024-12-13T14:07:18.806715386Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:18.807303 env[1493]: time="2024-12-13T14:07:18.807002187Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/21d7781c75ec8475e2f7b775a98f8e1423065c5f4fa079d044a6b37971600c86 pid=2732 runtime=io.containerd.runc.v2 Dec 13 14:07:18.818441 systemd[1]: Started cri-containerd-21d7781c75ec8475e2f7b775a98f8e1423065c5f4fa079d044a6b37971600c86.scope. Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.832000 audit: BPF prog-id=105 op=LOAD Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2732 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643737383163373565633834373565326637623737356139386638 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2732 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643737383163373565633834373565326637623737356139386638 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.833000 audit: BPF prog-id=106 op=LOAD Dec 13 14:07:18.833000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2732 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.833000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643737383163373565633834373565326637623737356139386638 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.834000 audit: BPF prog-id=107 op=LOAD Dec 13 14:07:18.834000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2732 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.834000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643737383163373565633834373565326637623737356139386638 Dec 13 14:07:18.835000 audit: BPF prog-id=107 op=UNLOAD Dec 13 14:07:18.835000 audit: BPF prog-id=106 op=UNLOAD Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { perfmon } for pid=2742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit[2742]: AVC avc: denied { bpf } for pid=2742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.835000 audit: BPF prog-id=108 op=LOAD Dec 13 14:07:18.835000 audit[2742]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2732 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231643737383163373565633834373565326637623737356139386638 Dec 13 14:07:18.849483 env[1493]: time="2024-12-13T14:07:18.849438632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-nzfxn,Uid:c2706e24-3af5-4a46-b041-fba4afdd6c7b,Namespace:kube-system,Attempt:0,} returns sandbox id \"21d7781c75ec8475e2f7b775a98f8e1423065c5f4fa079d044a6b37971600c86\"" Dec 13 14:07:18.854684 env[1493]: time="2024-12-13T14:07:18.854644007Z" level=info msg="CreateContainer within sandbox \"21d7781c75ec8475e2f7b775a98f8e1423065c5f4fa079d044a6b37971600c86\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:07:18.901389 env[1493]: time="2024-12-13T14:07:18.901330305Z" level=info msg="CreateContainer within sandbox \"21d7781c75ec8475e2f7b775a98f8e1423065c5f4fa079d044a6b37971600c86\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a5236d6a845492b1c059ae8bbc1d3b705965016c9e2024e33f3f56179c641254\"" Dec 13 14:07:18.904060 env[1493]: time="2024-12-13T14:07:18.904022473Z" level=info msg="StartContainer for \"a5236d6a845492b1c059ae8bbc1d3b705965016c9e2024e33f3f56179c641254\"" Dec 13 14:07:18.922453 systemd[1]: Started cri-containerd-a5236d6a845492b1c059ae8bbc1d3b705965016c9e2024e33f3f56179c641254.scope. Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2732 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135323336643661383435343932623163303539616538626263316433 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.936000 audit: BPF prog-id=109 op=LOAD Dec 13 14:07:18.936000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2732 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135323336643661383435343932623163303539616538626263316433 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.937000 audit: BPF prog-id=110 op=LOAD Dec 13 14:07:18.937000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2732 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135323336643661383435343932623163303539616538626263316433 Dec 13 14:07:18.937000 audit: BPF prog-id=110 op=UNLOAD Dec 13 14:07:18.937000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { perfmon } for pid=2772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit[2772]: AVC avc: denied { bpf } for pid=2772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:18.938000 audit: BPF prog-id=111 op=LOAD Dec 13 14:07:18.938000 audit[2772]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2732 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:18.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6135323336643661383435343932623163303539616538626263316433 Dec 13 14:07:18.962433 env[1493]: time="2024-12-13T14:07:18.962376085Z" level=info msg="StartContainer for \"a5236d6a845492b1c059ae8bbc1d3b705965016c9e2024e33f3f56179c641254\" returns successfully" Dec 13 14:07:19.020000 audit[2823]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.020000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeecdca20 a2=0 a3=1 items=0 ppid=2782 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.020000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:07:19.020000 audit[2824]: NETFILTER_CFG table=mangle:42 family=2 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.020000 audit[2824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdbd92890 a2=0 a3=1 items=0 ppid=2782 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.020000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:07:19.021000 audit[2826]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.021000 audit[2826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd3ac2cd0 a2=0 a3=1 items=0 ppid=2782 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.021000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:07:19.023000 audit[2827]: NETFILTER_CFG table=nat:44 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.023000 audit[2827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc33e8f90 a2=0 a3=1 items=0 ppid=2782 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.023000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:07:19.025000 audit[2828]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_chain pid=2828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.025000 audit[2828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd20b9bf0 a2=0 a3=1 items=0 ppid=2782 pid=2828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.025000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:07:19.034000 audit[2829]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.034000 audit[2829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde052a20 a2=0 a3=1 items=0 ppid=2782 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.034000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:07:19.120000 audit[2830]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.120000 audit[2830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd87de410 a2=0 a3=1 items=0 ppid=2782 pid=2830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.120000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:07:19.123000 audit[2832]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.123000 audit[2832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc91376f0 a2=0 a3=1 items=0 ppid=2782 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:07:19.126000 audit[2835]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2835 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.126000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdf9ad2b0 a2=0 a3=1 items=0 ppid=2782 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:07:19.127000 audit[2836]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.127000 audit[2836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7301f30 a2=0 a3=1 items=0 ppid=2782 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:07:19.129000 audit[2838]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.129000 audit[2838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffda7e3cd0 a2=0 a3=1 items=0 ppid=2782 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:07:19.130000 audit[2839]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2839 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.130000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa54d2a0 a2=0 a3=1 items=0 ppid=2782 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.130000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:07:19.133000 audit[2841]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.133000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff1641e70 a2=0 a3=1 items=0 ppid=2782 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.133000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:07:19.136000 audit[2844]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.136000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffebf3fcd0 a2=0 a3=1 items=0 ppid=2782 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:07:19.137000 audit[2845]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.137000 audit[2845]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdea81d0 a2=0 a3=1 items=0 ppid=2782 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.137000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:07:19.139000 audit[2847]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.139000 audit[2847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9a89820 a2=0 a3=1 items=0 ppid=2782 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.139000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:07:19.140000 audit[2848]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.140000 audit[2848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe56d3230 a2=0 a3=1 items=0 ppid=2782 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.140000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:07:19.143000 audit[2850]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.143000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff466ff60 a2=0 a3=1 items=0 ppid=2782 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.143000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:19.146000 audit[2853]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.146000 audit[2853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff0e3bf20 a2=0 a3=1 items=0 ppid=2782 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:19.149000 audit[2856]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2856 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.149000 audit[2856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe81be6e0 a2=0 a3=1 items=0 ppid=2782 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:07:19.150000 audit[2857]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2857 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.150000 audit[2857]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee790660 a2=0 a3=1 items=0 ppid=2782 pid=2857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:07:19.153000 audit[2859]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.153000 audit[2859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc8b86590 a2=0 a3=1 items=0 ppid=2782 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:19.156000 audit[2862]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2862 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.156000 audit[2862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff481f180 a2=0 a3=1 items=0 ppid=2782 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:19.157000 audit[2863]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2863 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.157000 audit[2863]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedc958e0 a2=0 a3=1 items=0 ppid=2782 pid=2863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:07:19.159000 audit[2865]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2865 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:19.159000 audit[2865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff77e3cc0 a2=0 a3=1 items=0 ppid=2782 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.159000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:07:19.255000 audit[2871]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:19.255000 audit[2871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd7b3fc90 a2=0 a3=1 items=0 ppid=2782 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:19.310473 kubelet[2604]: I1213 14:07:19.309753 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-nzfxn" podStartSLOduration=2.309735612 podStartE2EDuration="2.309735612s" podCreationTimestamp="2024-12-13 14:07:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:19.30895693 +0000 UTC m=+17.192391056" watchObservedRunningTime="2024-12-13 14:07:19.309735612 +0000 UTC m=+17.193169738" Dec 13 14:07:19.313000 audit[2871]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2871 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:19.313000 audit[2871]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd7b3fc90 a2=0 a3=1 items=0 ppid=2782 pid=2871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.313000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:19.317000 audit[2877]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2877 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.317000 audit[2877]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd8ef4dd0 a2=0 a3=1 items=0 ppid=2782 pid=2877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:07:19.319000 audit[2879]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2879 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.319000 audit[2879]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdcd69030 a2=0 a3=1 items=0 ppid=2782 pid=2879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.319000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:07:19.326000 audit[2882]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2882 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.326000 audit[2882]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd10cc4d0 a2=0 a3=1 items=0 ppid=2782 pid=2882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:07:19.328000 audit[2883]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2883 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.328000 audit[2883]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddfeb770 a2=0 a3=1 items=0 ppid=2782 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:07:19.330000 audit[2885]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2885 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.330000 audit[2885]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcdab47d0 a2=0 a3=1 items=0 ppid=2782 pid=2885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:07:19.331000 audit[2886]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2886 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.331000 audit[2886]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd641540 a2=0 a3=1 items=0 ppid=2782 pid=2886 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:07:19.334000 audit[2888]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2888 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.334000 audit[2888]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe6724e10 a2=0 a3=1 items=0 ppid=2782 pid=2888 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:07:19.337000 audit[2891]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2891 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.337000 audit[2891]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffe767660 a2=0 a3=1 items=0 ppid=2782 pid=2891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.337000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:07:19.338000 audit[2892]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2892 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.338000 audit[2892]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcf6609e0 a2=0 a3=1 items=0 ppid=2782 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.338000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:07:19.340000 audit[2894]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.340000 audit[2894]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff217f3d0 a2=0 a3=1 items=0 ppid=2782 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.340000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:07:19.341000 audit[2895]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2895 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.341000 audit[2895]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe9c2c020 a2=0 a3=1 items=0 ppid=2782 pid=2895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.341000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:07:19.344000 audit[2897]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2897 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.344000 audit[2897]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffee8554d0 a2=0 a3=1 items=0 ppid=2782 pid=2897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:19.354000 audit[2900]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2900 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.354000 audit[2900]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3de7670 a2=0 a3=1 items=0 ppid=2782 pid=2900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.354000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:07:19.358000 audit[2903]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2903 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.358000 audit[2903]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5b90650 a2=0 a3=1 items=0 ppid=2782 pid=2903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:07:19.359000 audit[2904]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2904 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.359000 audit[2904]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff4cd0e60 a2=0 a3=1 items=0 ppid=2782 pid=2904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.359000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:07:19.361000 audit[2906]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2906 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.361000 audit[2906]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffc58614d0 a2=0 a3=1 items=0 ppid=2782 pid=2906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.361000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:19.364000 audit[2909]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2909 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.364000 audit[2909]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffdc337c40 a2=0 a3=1 items=0 ppid=2782 pid=2909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.364000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:19.365000 audit[2910]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2910 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.365000 audit[2910]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff02e1080 a2=0 a3=1 items=0 ppid=2782 pid=2910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.365000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:07:19.368000 audit[2912]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2912 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.368000 audit[2912]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd2ee1380 a2=0 a3=1 items=0 ppid=2782 pid=2912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:07:19.369000 audit[2913]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2913 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.369000 audit[2913]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd5eaa90 a2=0 a3=1 items=0 ppid=2782 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:07:19.371000 audit[2915]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2915 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.371000 audit[2915]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe901de50 a2=0 a3=1 items=0 ppid=2782 pid=2915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:19.374000 audit[2918]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2918 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:19.374000 audit[2918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffcca18f0 a2=0 a3=1 items=0 ppid=2782 pid=2918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:19.376000 audit[2920]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:07:19.376000 audit[2920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffcdec2420 a2=0 a3=1 items=0 ppid=2782 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.376000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:19.377000 audit[2920]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2920 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:07:19.377000 audit[2920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcdec2420 a2=0 a3=1 items=0 ppid=2782 pid=2920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:19.377000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:21.211653 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1878155894.mount: Deactivated successfully. Dec 13 14:07:21.730403 env[1493]: time="2024-12-13T14:07:21.730353841Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:21.737326 env[1493]: time="2024-12-13T14:07:21.737262620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:21.740930 env[1493]: time="2024-12-13T14:07:21.740886430Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:21.746694 env[1493]: time="2024-12-13T14:07:21.746654606Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:21.747149 env[1493]: time="2024-12-13T14:07:21.747120367Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:07:21.751629 env[1493]: time="2024-12-13T14:07:21.751580860Z" level=info msg="CreateContainer within sandbox \"a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:07:21.780054 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount711986180.mount: Deactivated successfully. Dec 13 14:07:21.800368 env[1493]: time="2024-12-13T14:07:21.800318795Z" level=info msg="CreateContainer within sandbox \"a2c29fd3ef9a0dd42791784e5b2c2bec5de13aaf865563711e17c83f9ac640d3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"60144a45fb740c6e19f7ae9a71edc8828ba623e01e99e566b96525e310ced783\"" Dec 13 14:07:21.801238 env[1493]: time="2024-12-13T14:07:21.801207398Z" level=info msg="StartContainer for \"60144a45fb740c6e19f7ae9a71edc8828ba623e01e99e566b96525e310ced783\"" Dec 13 14:07:21.815201 systemd[1]: Started cri-containerd-60144a45fb740c6e19f7ae9a71edc8828ba623e01e99e566b96525e310ced783.scope. Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.834029 kernel: kauditd_printk_skb: 312 callbacks suppressed Dec 13 14:07:21.834086 kernel: audit: type=1400 audit(1734098841.827:929): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.869300 kernel: audit: type=1400 audit(1734098841.827:930): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.887299 kernel: audit: type=1400 audit(1734098841.827:931): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.925015 kernel: audit: type=1400 audit(1734098841.827:932): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.925144 kernel: audit: type=1400 audit(1734098841.827:933): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.947213 kernel: audit: type=1400 audit(1734098841.827:934): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.948639 kernel: audit: type=1400 audit(1734098841.827:935): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.983793 kernel: audit: type=1400 audit(1734098841.827:936): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.983906 kernel: audit: type=1400 audit(1734098841.827:937): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:22.019231 kernel: audit: type=1400 audit(1734098841.827:938): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.827000 audit: BPF prog-id=112 op=LOAD Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2690 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313434613435666237343063366531396637616539613731656463 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2690 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313434613435666237343063366531396637616539613731656463 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.832000 audit: BPF prog-id=113 op=LOAD Dec 13 14:07:21.832000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2690 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313434613435666237343063366531396637616539613731656463 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.851000 audit: BPF prog-id=114 op=LOAD Dec 13 14:07:21.851000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2690 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313434613435666237343063366531396637616539613731656463 Dec 13 14:07:21.868000 audit: BPF prog-id=114 op=UNLOAD Dec 13 14:07:21.868000 audit: BPF prog-id=113 op=UNLOAD Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { perfmon } for pid=2928 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit[2928]: AVC avc: denied { bpf } for pid=2928 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:21.868000 audit: BPF prog-id=115 op=LOAD Dec 13 14:07:21.868000 audit[2928]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2690 pid=2928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.868000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630313434613435666237343063366531396637616539613731656463 Dec 13 14:07:22.024072 env[1493]: time="2024-12-13T14:07:22.024027457Z" level=info msg="StartContainer for \"60144a45fb740c6e19f7ae9a71edc8828ba623e01e99e566b96525e310ced783\" returns successfully" Dec 13 14:07:22.176114 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1424787322.mount: Deactivated successfully. Dec 13 14:07:26.089000 audit[2960]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:26.089000 audit[2960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc29aa0b0 a2=0 a3=1 items=0 ppid=2782 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:26.089000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:26.094000 audit[2960]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2960 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:26.094000 audit[2960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc29aa0b0 a2=0 a3=1 items=0 ppid=2782 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:26.094000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:26.121000 audit[2962]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:26.121000 audit[2962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe0032d60 a2=0 a3=1 items=0 ppid=2782 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:26.121000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:26.127000 audit[2962]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:26.127000 audit[2962]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe0032d60 a2=0 a3=1 items=0 ppid=2782 pid=2962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:26.127000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:27.001097 kubelet[2604]: I1213 14:07:27.001011 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7bc55997bb-g7z8k" podStartSLOduration=6.004609539 podStartE2EDuration="9.000993086s" podCreationTimestamp="2024-12-13 14:07:18 +0000 UTC" firstStartedPulling="2024-12-13 14:07:18.752254505 +0000 UTC m=+16.635688631" lastFinishedPulling="2024-12-13 14:07:21.748638092 +0000 UTC m=+19.632072178" observedRunningTime="2024-12-13 14:07:22.328025808 +0000 UTC m=+20.211459934" watchObservedRunningTime="2024-12-13 14:07:27.000993086 +0000 UTC m=+24.884427212" Dec 13 14:07:27.001554 kubelet[2604]: I1213 14:07:27.001191 2604 topology_manager.go:215] "Topology Admit Handler" podUID="52ef96f9-c22a-4e8b-9d42-cbd022af8c23" podNamespace="calico-system" podName="calico-typha-ccb8748f7-sj2cs" Dec 13 14:07:27.006524 systemd[1]: Created slice kubepods-besteffort-pod52ef96f9_c22a_4e8b_9d42_cbd022af8c23.slice. Dec 13 14:07:27.140000 audit[2965]: NETFILTER_CFG table=filter:96 family=2 entries=17 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:27.147616 kernel: kauditd_printk_skb: 59 callbacks suppressed Dec 13 14:07:27.147733 kernel: audit: type=1325 audit(1734098847.140:951): table=filter:96 family=2 entries=17 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:27.140000 audit[2965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffca71ebc0 a2=0 a3=1 items=0 ppid=2782 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.173541 kubelet[2604]: I1213 14:07:27.173495 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/52ef96f9-c22a-4e8b-9d42-cbd022af8c23-tigera-ca-bundle\") pod \"calico-typha-ccb8748f7-sj2cs\" (UID: \"52ef96f9-c22a-4e8b-9d42-cbd022af8c23\") " pod="calico-system/calico-typha-ccb8748f7-sj2cs" Dec 13 14:07:27.173759 kubelet[2604]: I1213 14:07:27.173730 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/52ef96f9-c22a-4e8b-9d42-cbd022af8c23-typha-certs\") pod \"calico-typha-ccb8748f7-sj2cs\" (UID: \"52ef96f9-c22a-4e8b-9d42-cbd022af8c23\") " pod="calico-system/calico-typha-ccb8748f7-sj2cs" Dec 13 14:07:27.173882 kubelet[2604]: I1213 14:07:27.173867 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v9fnj\" (UniqueName: \"kubernetes.io/projected/52ef96f9-c22a-4e8b-9d42-cbd022af8c23-kube-api-access-v9fnj\") pod \"calico-typha-ccb8748f7-sj2cs\" (UID: \"52ef96f9-c22a-4e8b-9d42-cbd022af8c23\") " pod="calico-system/calico-typha-ccb8748f7-sj2cs" Dec 13 14:07:27.192078 kernel: audit: type=1300 audit(1734098847.140:951): arch=c00000b7 syscall=211 success=yes exit=6652 a0=3 a1=ffffca71ebc0 a2=0 a3=1 items=0 ppid=2782 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.140000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:27.208570 kernel: audit: type=1327 audit(1734098847.140:951): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:27.194000 audit[2965]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:27.227073 kernel: audit: type=1325 audit(1734098847.194:952): table=nat:97 family=2 entries=12 op=nft_register_rule pid=2965 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:27.230693 kubelet[2604]: I1213 14:07:27.230650 2604 topology_manager.go:215] "Topology Admit Handler" podUID="fb4ce560-febd-4e79-af3a-515642a69fad" podNamespace="calico-system" podName="calico-node-tgpv6" Dec 13 14:07:27.194000 audit[2965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffca71ebc0 a2=0 a3=1 items=0 ppid=2782 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.258664 kernel: audit: type=1300 audit(1734098847.194:952): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffca71ebc0 a2=0 a3=1 items=0 ppid=2782 pid=2965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.194000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:27.274004 kernel: audit: type=1327 audit(1734098847.194:952): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:27.274389 kubelet[2604]: I1213 14:07:27.274310 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5mxvd\" (UniqueName: \"kubernetes.io/projected/fb4ce560-febd-4e79-af3a-515642a69fad-kube-api-access-5mxvd\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274489 kubelet[2604]: I1213 14:07:27.274369 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-cni-bin-dir\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274489 kubelet[2604]: I1213 14:07:27.274483 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-cni-log-dir\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274550 kubelet[2604]: I1213 14:07:27.274502 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-xtables-lock\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274550 kubelet[2604]: I1213 14:07:27.274532 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-policysync\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274609 kubelet[2604]: I1213 14:07:27.274550 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fb4ce560-febd-4e79-af3a-515642a69fad-tigera-ca-bundle\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274609 kubelet[2604]: I1213 14:07:27.274566 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-cni-net-dir\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274609 kubelet[2604]: I1213 14:07:27.274581 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-flexvol-driver-host\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274609 kubelet[2604]: I1213 14:07:27.274606 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-lib-modules\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274704 kubelet[2604]: I1213 14:07:27.274624 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-var-lib-calico\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274704 kubelet[2604]: I1213 14:07:27.274642 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/fb4ce560-febd-4e79-af3a-515642a69fad-node-certs\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.274704 kubelet[2604]: I1213 14:07:27.274656 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/fb4ce560-febd-4e79-af3a-515642a69fad-var-run-calico\") pod \"calico-node-tgpv6\" (UID: \"fb4ce560-febd-4e79-af3a-515642a69fad\") " pod="calico-system/calico-node-tgpv6" Dec 13 14:07:27.285728 systemd[1]: Created slice kubepods-besteffort-podfb4ce560_febd_4e79_af3a_515642a69fad.slice. Dec 13 14:07:27.309264 env[1493]: time="2024-12-13T14:07:27.309174855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-ccb8748f7-sj2cs,Uid:52ef96f9-c22a-4e8b-9d42-cbd022af8c23,Namespace:calico-system,Attempt:0,}" Dec 13 14:07:27.352887 env[1493]: time="2024-12-13T14:07:27.352507123Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:27.352887 env[1493]: time="2024-12-13T14:07:27.352542603Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:27.352887 env[1493]: time="2024-12-13T14:07:27.352552523Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:27.352887 env[1493]: time="2024-12-13T14:07:27.352651043Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/214d968a0858dda3e4428bdcb14563d436ca5bbfb5152c54e7469ee5198314a0 pid=2975 runtime=io.containerd.runc.v2 Dec 13 14:07:27.382076 kubelet[2604]: E1213 14:07:27.382050 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.382244 kubelet[2604]: W1213 14:07:27.382229 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.382346 kubelet[2604]: E1213 14:07:27.382334 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.386385 systemd[1]: Started cri-containerd-214d968a0858dda3e4428bdcb14563d436ca5bbfb5152c54e7469ee5198314a0.scope. Dec 13 14:07:27.393157 kubelet[2604]: E1213 14:07:27.393135 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.393344 kubelet[2604]: W1213 14:07:27.393330 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.393432 kubelet[2604]: E1213 14:07:27.393419 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.404430 kubelet[2604]: I1213 14:07:27.404391 2604 topology_manager.go:215] "Topology Admit Handler" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" podNamespace="calico-system" podName="csi-node-driver-bn7rv" Dec 13 14:07:27.404897 kubelet[2604]: E1213 14:07:27.404868 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.449913 kernel: audit: type=1400 audit(1734098847.410:953): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.450045 kernel: audit: type=1400 audit(1734098847.410:954): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.467683 kernel: audit: type=1400 audit(1734098847.410:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.479509 kubelet[2604]: E1213 14:07:27.479482 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.479659 kubelet[2604]: W1213 14:07:27.479644 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.479765 kubelet[2604]: E1213 14:07:27.479752 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.484438 kubelet[2604]: E1213 14:07:27.484420 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.484556 kubelet[2604]: W1213 14:07:27.484543 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.484622 kubelet[2604]: E1213 14:07:27.484611 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.485558 kernel: audit: type=1400 audit(1734098847.410:956): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.487741 kubelet[2604]: E1213 14:07:27.487723 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.487922 kubelet[2604]: W1213 14:07:27.487906 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.488010 kubelet[2604]: E1213 14:07:27.487997 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.488249 kubelet[2604]: E1213 14:07:27.488238 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.488372 kubelet[2604]: W1213 14:07:27.488359 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.488449 kubelet[2604]: E1213 14:07:27.488437 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.488716 kubelet[2604]: E1213 14:07:27.488703 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.488822 kubelet[2604]: W1213 14:07:27.488810 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.488908 kubelet[2604]: E1213 14:07:27.488896 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.489166 kubelet[2604]: E1213 14:07:27.489153 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.489264 kubelet[2604]: W1213 14:07:27.489253 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.489393 kubelet[2604]: E1213 14:07:27.489380 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.489638 kubelet[2604]: E1213 14:07:27.489627 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.489738 kubelet[2604]: W1213 14:07:27.489726 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.489814 kubelet[2604]: E1213 14:07:27.489802 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.490049 kubelet[2604]: E1213 14:07:27.490024 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.490135 kubelet[2604]: W1213 14:07:27.490108 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.490204 kubelet[2604]: E1213 14:07:27.490185 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.410000 audit: BPF prog-id=116 op=LOAD Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2975 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346439363861303835386464613365343432386264636231343536 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2975 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346439363861303835386464613365343432386264636231343536 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit: BPF prog-id=117 op=LOAD Dec 13 14:07:27.429000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2975 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346439363861303835386464613365343432386264636231343536 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit: BPF prog-id=118 op=LOAD Dec 13 14:07:27.429000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2975 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346439363861303835386464613365343432386264636231343536 Dec 13 14:07:27.429000 audit: BPF prog-id=118 op=UNLOAD Dec 13 14:07:27.429000 audit: BPF prog-id=117 op=UNLOAD Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { perfmon } for pid=2983 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit[2983]: AVC avc: denied { bpf } for pid=2983 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.429000 audit: BPF prog-id=119 op=LOAD Dec 13 14:07:27.429000 audit[2983]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2975 pid=2983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.429000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346439363861303835386464613365343432386264636231343536 Dec 13 14:07:27.492054 kubelet[2604]: E1213 14:07:27.492039 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.492159 kubelet[2604]: W1213 14:07:27.492146 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.492240 kubelet[2604]: E1213 14:07:27.492228 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.492543 kubelet[2604]: E1213 14:07:27.492522 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.492641 kubelet[2604]: W1213 14:07:27.492629 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.492725 kubelet[2604]: E1213 14:07:27.492714 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.493003 kubelet[2604]: E1213 14:07:27.492991 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.493107 kubelet[2604]: W1213 14:07:27.493095 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.493184 kubelet[2604]: E1213 14:07:27.493173 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.493610 kubelet[2604]: E1213 14:07:27.493582 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.496289 kubelet[2604]: W1213 14:07:27.493736 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.496418 kubelet[2604]: E1213 14:07:27.496402 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.496701 kubelet[2604]: E1213 14:07:27.496689 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.496804 kubelet[2604]: W1213 14:07:27.496791 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.496883 kubelet[2604]: E1213 14:07:27.496872 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.497090 kubelet[2604]: E1213 14:07:27.497079 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.497179 kubelet[2604]: W1213 14:07:27.497167 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.497240 kubelet[2604]: E1213 14:07:27.497229 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.497466 kubelet[2604]: E1213 14:07:27.497455 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.497552 kubelet[2604]: W1213 14:07:27.497541 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.497611 kubelet[2604]: E1213 14:07:27.497601 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.497834 kubelet[2604]: E1213 14:07:27.497822 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.497979 kubelet[2604]: W1213 14:07:27.497943 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.498048 kubelet[2604]: E1213 14:07:27.498036 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.498305 kubelet[2604]: E1213 14:07:27.498292 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.498396 kubelet[2604]: W1213 14:07:27.498384 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.498455 kubelet[2604]: E1213 14:07:27.498445 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.498680 kubelet[2604]: E1213 14:07:27.498670 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.498748 kubelet[2604]: W1213 14:07:27.498737 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.498882 kubelet[2604]: E1213 14:07:27.498870 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.500085 kubelet[2604]: E1213 14:07:27.500068 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.500188 kubelet[2604]: W1213 14:07:27.500175 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.500250 kubelet[2604]: E1213 14:07:27.500237 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.500475 kubelet[2604]: E1213 14:07:27.500465 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.500546 kubelet[2604]: W1213 14:07:27.500535 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.500607 kubelet[2604]: E1213 14:07:27.500594 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.500980 kubelet[2604]: E1213 14:07:27.500968 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.501069 kubelet[2604]: W1213 14:07:27.501057 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.501131 kubelet[2604]: E1213 14:07:27.501120 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.501205 kubelet[2604]: I1213 14:07:27.501193 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5cx5\" (UniqueName: \"kubernetes.io/projected/4982cd66-aea8-4e3a-8a68-3fc8def21791-kube-api-access-k5cx5\") pod \"csi-node-driver-bn7rv\" (UID: \"4982cd66-aea8-4e3a-8a68-3fc8def21791\") " pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:27.501478 kubelet[2604]: E1213 14:07:27.501467 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.501564 kubelet[2604]: W1213 14:07:27.501552 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.501627 kubelet[2604]: E1213 14:07:27.501615 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.501828 kubelet[2604]: E1213 14:07:27.501816 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.501901 kubelet[2604]: W1213 14:07:27.501890 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.501963 kubelet[2604]: E1213 14:07:27.501953 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.502085 kubelet[2604]: I1213 14:07:27.502072 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/4982cd66-aea8-4e3a-8a68-3fc8def21791-socket-dir\") pod \"csi-node-driver-bn7rv\" (UID: \"4982cd66-aea8-4e3a-8a68-3fc8def21791\") " pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:27.503105 kubelet[2604]: E1213 14:07:27.503086 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.503192 kubelet[2604]: W1213 14:07:27.503179 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.503291 kubelet[2604]: E1213 14:07:27.503255 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.503569 kubelet[2604]: E1213 14:07:27.503557 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.503650 kubelet[2604]: W1213 14:07:27.503638 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.503710 kubelet[2604]: E1213 14:07:27.503700 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.503907 kubelet[2604]: E1213 14:07:27.503895 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.503975 kubelet[2604]: W1213 14:07:27.503964 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.504039 kubelet[2604]: E1213 14:07:27.504027 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.504163 kubelet[2604]: I1213 14:07:27.504150 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/4982cd66-aea8-4e3a-8a68-3fc8def21791-kubelet-dir\") pod \"csi-node-driver-bn7rv\" (UID: \"4982cd66-aea8-4e3a-8a68-3fc8def21791\") " pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:27.504345 kubelet[2604]: E1213 14:07:27.504334 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.504421 kubelet[2604]: W1213 14:07:27.504410 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.504479 kubelet[2604]: E1213 14:07:27.504469 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.506473 kubelet[2604]: E1213 14:07:27.506458 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.506557 kubelet[2604]: W1213 14:07:27.506545 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.506690 kubelet[2604]: E1213 14:07:27.506677 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.506903 kubelet[2604]: E1213 14:07:27.506891 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.506983 kubelet[2604]: W1213 14:07:27.506971 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.507046 kubelet[2604]: E1213 14:07:27.507036 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.507229 kubelet[2604]: I1213 14:07:27.507215 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/4982cd66-aea8-4e3a-8a68-3fc8def21791-registration-dir\") pod \"csi-node-driver-bn7rv\" (UID: \"4982cd66-aea8-4e3a-8a68-3fc8def21791\") " pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:27.507369 kubelet[2604]: E1213 14:07:27.507340 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.507438 kubelet[2604]: W1213 14:07:27.507427 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.507511 kubelet[2604]: E1213 14:07:27.507500 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.507913 kubelet[2604]: E1213 14:07:27.507899 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.508001 kubelet[2604]: W1213 14:07:27.507989 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.508064 kubelet[2604]: E1213 14:07:27.508054 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.508212 kubelet[2604]: I1213 14:07:27.508198 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/4982cd66-aea8-4e3a-8a68-3fc8def21791-varrun\") pod \"csi-node-driver-bn7rv\" (UID: \"4982cd66-aea8-4e3a-8a68-3fc8def21791\") " pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:27.508384 kubelet[2604]: E1213 14:07:27.508336 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.508453 kubelet[2604]: W1213 14:07:27.508442 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.508583 kubelet[2604]: E1213 14:07:27.508511 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.509540 kubelet[2604]: E1213 14:07:27.509523 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.509684 kubelet[2604]: W1213 14:07:27.509669 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.509751 kubelet[2604]: E1213 14:07:27.509741 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.510015 kubelet[2604]: E1213 14:07:27.509953 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.510096 kubelet[2604]: W1213 14:07:27.510084 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.510154 kubelet[2604]: E1213 14:07:27.510144 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.510402 kubelet[2604]: E1213 14:07:27.510391 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.510501 kubelet[2604]: W1213 14:07:27.510487 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.510563 kubelet[2604]: E1213 14:07:27.510553 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.533374 env[1493]: time="2024-12-13T14:07:27.533300894Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-ccb8748f7-sj2cs,Uid:52ef96f9-c22a-4e8b-9d42-cbd022af8c23,Namespace:calico-system,Attempt:0,} returns sandbox id \"214d968a0858dda3e4428bdcb14563d436ca5bbfb5152c54e7469ee5198314a0\"" Dec 13 14:07:27.535074 env[1493]: time="2024-12-13T14:07:27.535039459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:07:27.606421 env[1493]: time="2024-12-13T14:07:27.606382877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgpv6,Uid:fb4ce560-febd-4e79-af3a-515642a69fad,Namespace:calico-system,Attempt:0,}" Dec 13 14:07:27.609397 kubelet[2604]: E1213 14:07:27.609370 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.609397 kubelet[2604]: W1213 14:07:27.609392 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.609538 kubelet[2604]: E1213 14:07:27.609412 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.609732 kubelet[2604]: E1213 14:07:27.609715 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.609732 kubelet[2604]: W1213 14:07:27.609729 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.609821 kubelet[2604]: E1213 14:07:27.609750 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.609927 kubelet[2604]: E1213 14:07:27.609912 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.609927 kubelet[2604]: W1213 14:07:27.609925 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.609982 kubelet[2604]: E1213 14:07:27.609935 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.610168 kubelet[2604]: E1213 14:07:27.610152 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.610223 kubelet[2604]: W1213 14:07:27.610173 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.610223 kubelet[2604]: E1213 14:07:27.610189 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.610396 kubelet[2604]: E1213 14:07:27.610380 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.610396 kubelet[2604]: W1213 14:07:27.610392 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.610470 kubelet[2604]: E1213 14:07:27.610403 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.610618 kubelet[2604]: E1213 14:07:27.610603 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.610618 kubelet[2604]: W1213 14:07:27.610618 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.610701 kubelet[2604]: E1213 14:07:27.610634 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.610803 kubelet[2604]: E1213 14:07:27.610787 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.610803 kubelet[2604]: W1213 14:07:27.610799 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.610864 kubelet[2604]: E1213 14:07:27.610807 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.611551 kubelet[2604]: E1213 14:07:27.611532 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.611551 kubelet[2604]: W1213 14:07:27.611547 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.611718 kubelet[2604]: E1213 14:07:27.611699 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.611718 kubelet[2604]: W1213 14:07:27.611712 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.611810 kubelet[2604]: E1213 14:07:27.611795 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.611885 kubelet[2604]: E1213 14:07:27.611873 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.612053 kubelet[2604]: E1213 14:07:27.612036 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.612053 kubelet[2604]: W1213 14:07:27.612050 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.612173 kubelet[2604]: E1213 14:07:27.612159 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.612236 kubelet[2604]: E1213 14:07:27.612189 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.612329 kubelet[2604]: W1213 14:07:27.612315 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.612419 kubelet[2604]: E1213 14:07:27.612400 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.612696 kubelet[2604]: E1213 14:07:27.612681 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.612775 kubelet[2604]: W1213 14:07:27.612763 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.612871 kubelet[2604]: E1213 14:07:27.612847 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.613105 kubelet[2604]: E1213 14:07:27.613090 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.613186 kubelet[2604]: W1213 14:07:27.613173 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.613252 kubelet[2604]: E1213 14:07:27.613241 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.613453 kubelet[2604]: E1213 14:07:27.613432 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.613453 kubelet[2604]: W1213 14:07:27.613449 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.613549 kubelet[2604]: E1213 14:07:27.613462 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.614475 kubelet[2604]: E1213 14:07:27.614445 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.614604 kubelet[2604]: W1213 14:07:27.614582 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.614766 kubelet[2604]: E1213 14:07:27.614752 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.615179 kubelet[2604]: E1213 14:07:27.615166 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.615288 kubelet[2604]: W1213 14:07:27.615259 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.615465 kubelet[2604]: E1213 14:07:27.615448 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.615974 kubelet[2604]: E1213 14:07:27.615945 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.616076 kubelet[2604]: W1213 14:07:27.616063 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.616156 kubelet[2604]: E1213 14:07:27.616144 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.619299 kubelet[2604]: E1213 14:07:27.617343 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.619299 kubelet[2604]: W1213 14:07:27.617361 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.619760 kubelet[2604]: E1213 14:07:27.619410 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.619760 kubelet[2604]: E1213 14:07:27.619540 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.619760 kubelet[2604]: W1213 14:07:27.619549 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.619760 kubelet[2604]: E1213 14:07:27.619609 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.621402 kubelet[2604]: E1213 14:07:27.621375 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.621402 kubelet[2604]: W1213 14:07:27.621395 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.621668 kubelet[2604]: E1213 14:07:27.621646 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.621668 kubelet[2604]: W1213 14:07:27.621663 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.621850 kubelet[2604]: E1213 14:07:27.621833 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.621894 kubelet[2604]: W1213 14:07:27.621849 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.621894 kubelet[2604]: E1213 14:07:27.621862 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.622062 kubelet[2604]: E1213 14:07:27.622045 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.622062 kubelet[2604]: W1213 14:07:27.622060 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.622129 kubelet[2604]: E1213 14:07:27.622073 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.622129 kubelet[2604]: E1213 14:07:27.622092 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.622343 kubelet[2604]: E1213 14:07:27.622301 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.622343 kubelet[2604]: W1213 14:07:27.622316 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.622343 kubelet[2604]: E1213 14:07:27.622326 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.622343 kubelet[2604]: E1213 14:07:27.622342 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.624819 kubelet[2604]: E1213 14:07:27.624796 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.624819 kubelet[2604]: W1213 14:07:27.624813 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.624897 kubelet[2604]: E1213 14:07:27.624825 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.625434 kubelet[2604]: E1213 14:07:27.625417 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:27.625515 kubelet[2604]: W1213 14:07:27.625503 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:27.625593 kubelet[2604]: E1213 14:07:27.625582 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:27.653255 env[1493]: time="2024-12-13T14:07:27.653185393Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:27.653441 env[1493]: time="2024-12-13T14:07:27.653227993Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:27.653441 env[1493]: time="2024-12-13T14:07:27.653255514Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:27.653555 env[1493]: time="2024-12-13T14:07:27.653469754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478 pid=3085 runtime=io.containerd.runc.v2 Dec 13 14:07:27.664606 systemd[1]: Started cri-containerd-9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478.scope. Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit: BPF prog-id=120 op=LOAD Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3085 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336663633666663861343634343834373433623366353462313732 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3085 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336663633666663861343634343834373433623366353462313732 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.675000 audit: BPF prog-id=121 op=LOAD Dec 13 14:07:27.675000 audit[3095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3085 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.675000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336663633666663861343634343834373433623366353462313732 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit: BPF prog-id=122 op=LOAD Dec 13 14:07:27.676000 audit[3095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3085 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336663633666663861343634343834373433623366353462313732 Dec 13 14:07:27.676000 audit: BPF prog-id=122 op=UNLOAD Dec 13 14:07:27.676000 audit: BPF prog-id=121 op=UNLOAD Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { perfmon } for pid=3095 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit[3095]: AVC avc: denied { bpf } for pid=3095 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:27.676000 audit: BPF prog-id=123 op=LOAD Dec 13 14:07:27.676000 audit[3095]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3085 pid=3095 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:27.676000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961336663633666663861343634343834373433623366353462313732 Dec 13 14:07:27.689809 env[1493]: time="2024-12-13T14:07:27.689758765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-tgpv6,Uid:fb4ce560-febd-4e79-af3a-515642a69fad,Namespace:calico-system,Attempt:0,} returns sandbox id \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\"" Dec 13 14:07:29.099047 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3129174926.mount: Deactivated successfully. Dec 13 14:07:29.249341 kubelet[2604]: E1213 14:07:29.249102 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:30.017938 env[1493]: time="2024-12-13T14:07:30.017787364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.026449 env[1493]: time="2024-12-13T14:07:30.026413505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.032633 env[1493]: time="2024-12-13T14:07:30.032598959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.039156 env[1493]: time="2024-12-13T14:07:30.039121255Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.039953 env[1493]: time="2024-12-13T14:07:30.039924297Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:07:30.047209 env[1493]: time="2024-12-13T14:07:30.044569828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:07:30.060839 env[1493]: time="2024-12-13T14:07:30.060783346Z" level=info msg="CreateContainer within sandbox \"214d968a0858dda3e4428bdcb14563d436ca5bbfb5152c54e7469ee5198314a0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:07:30.103179 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount804579026.mount: Deactivated successfully. Dec 13 14:07:30.119333 env[1493]: time="2024-12-13T14:07:30.119234045Z" level=info msg="CreateContainer within sandbox \"214d968a0858dda3e4428bdcb14563d436ca5bbfb5152c54e7469ee5198314a0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"a34f5033a67dfda083b340225e6ec8f748c2a0273668850e52a4d9b17b34acda\"" Dec 13 14:07:30.121182 env[1493]: time="2024-12-13T14:07:30.120781008Z" level=info msg="StartContainer for \"a34f5033a67dfda083b340225e6ec8f748c2a0273668850e52a4d9b17b34acda\"" Dec 13 14:07:30.143745 systemd[1]: Started cri-containerd-a34f5033a67dfda083b340225e6ec8f748c2a0273668850e52a4d9b17b34acda.scope. Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.153000 audit: BPF prog-id=124 op=LOAD Dec 13 14:07:30.154000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.154000 audit[3128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2975 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133346635303333613637646664613038336233343032323565366563 Dec 13 14:07:30.154000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.154000 audit[3128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2975 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.154000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133346635303333613637646664613038336233343032323565366563 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit: BPF prog-id=125 op=LOAD Dec 13 14:07:30.155000 audit[3128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2975 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133346635303333613637646664613038336233343032323565366563 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.155000 audit: BPF prog-id=126 op=LOAD Dec 13 14:07:30.155000 audit[3128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2975 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133346635303333613637646664613038336233343032323565366563 Dec 13 14:07:30.156000 audit: BPF prog-id=126 op=UNLOAD Dec 13 14:07:30.156000 audit: BPF prog-id=125 op=UNLOAD Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { perfmon } for pid=3128 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit[3128]: AVC avc: denied { bpf } for pid=3128 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:30.156000 audit: BPF prog-id=127 op=LOAD Dec 13 14:07:30.156000 audit[3128]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2975 pid=3128 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133346635303333613637646664613038336233343032323565366563 Dec 13 14:07:30.186108 env[1493]: time="2024-12-13T14:07:30.186049723Z" level=info msg="StartContainer for \"a34f5033a67dfda083b340225e6ec8f748c2a0273668850e52a4d9b17b34acda\" returns successfully" Dec 13 14:07:30.335512 kubelet[2604]: I1213 14:07:30.335390 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-ccb8748f7-sj2cs" podStartSLOduration=1.8289554749999999 podStartE2EDuration="4.335372237s" podCreationTimestamp="2024-12-13 14:07:26 +0000 UTC" firstStartedPulling="2024-12-13 14:07:27.534793378 +0000 UTC m=+25.418227504" lastFinishedPulling="2024-12-13 14:07:30.04121014 +0000 UTC m=+27.924644266" observedRunningTime="2024-12-13 14:07:30.334722275 +0000 UTC m=+28.218156401" watchObservedRunningTime="2024-12-13 14:07:30.335372237 +0000 UTC m=+28.218806363" Dec 13 14:07:30.375000 audit[3159]: NETFILTER_CFG table=filter:98 family=2 entries=17 op=nft_register_rule pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:30.375000 audit[3159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc00a0570 a2=0 a3=1 items=0 ppid=2782 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.375000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:30.378000 audit[3159]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3159 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:30.378000 audit[3159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc00a0570 a2=0 a3=1 items=0 ppid=2782 pid=3159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:30.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:30.417732 kubelet[2604]: E1213 14:07:30.417697 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.417732 kubelet[2604]: W1213 14:07:30.417722 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.417957 kubelet[2604]: E1213 14:07:30.417753 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.417957 kubelet[2604]: E1213 14:07:30.417931 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.417957 kubelet[2604]: W1213 14:07:30.417939 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.417957 kubelet[2604]: E1213 14:07:30.417948 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418102 kubelet[2604]: E1213 14:07:30.418074 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418102 kubelet[2604]: W1213 14:07:30.418096 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418181 kubelet[2604]: E1213 14:07:30.418105 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418282 kubelet[2604]: E1213 14:07:30.418253 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418282 kubelet[2604]: W1213 14:07:30.418281 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418356 kubelet[2604]: E1213 14:07:30.418290 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418456 kubelet[2604]: E1213 14:07:30.418440 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418456 kubelet[2604]: W1213 14:07:30.418452 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418586 kubelet[2604]: E1213 14:07:30.418460 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418586 kubelet[2604]: E1213 14:07:30.418580 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418643 kubelet[2604]: W1213 14:07:30.418595 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418643 kubelet[2604]: E1213 14:07:30.418607 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418750 kubelet[2604]: E1213 14:07:30.418734 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418750 kubelet[2604]: W1213 14:07:30.418747 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418824 kubelet[2604]: E1213 14:07:30.418756 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.418906 kubelet[2604]: E1213 14:07:30.418890 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.418906 kubelet[2604]: W1213 14:07:30.418903 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.418971 kubelet[2604]: E1213 14:07:30.418912 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419080 kubelet[2604]: E1213 14:07:30.419063 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419080 kubelet[2604]: W1213 14:07:30.419076 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419160 kubelet[2604]: E1213 14:07:30.419085 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419218 kubelet[2604]: E1213 14:07:30.419201 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419218 kubelet[2604]: W1213 14:07:30.419217 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419303 kubelet[2604]: E1213 14:07:30.419226 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419375 kubelet[2604]: E1213 14:07:30.419351 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419375 kubelet[2604]: W1213 14:07:30.419370 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419449 kubelet[2604]: E1213 14:07:30.419378 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419528 kubelet[2604]: E1213 14:07:30.419512 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419528 kubelet[2604]: W1213 14:07:30.419525 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419594 kubelet[2604]: E1213 14:07:30.419534 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419696 kubelet[2604]: E1213 14:07:30.419678 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419696 kubelet[2604]: W1213 14:07:30.419692 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419772 kubelet[2604]: E1213 14:07:30.419701 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.419853 kubelet[2604]: E1213 14:07:30.419837 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.419853 kubelet[2604]: W1213 14:07:30.419850 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.419920 kubelet[2604]: E1213 14:07:30.419859 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.420008 kubelet[2604]: E1213 14:07:30.419992 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.420008 kubelet[2604]: W1213 14:07:30.420007 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.420080 kubelet[2604]: E1213 14:07:30.420016 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.427661 kubelet[2604]: E1213 14:07:30.427621 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.427661 kubelet[2604]: W1213 14:07:30.427647 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.427661 kubelet[2604]: E1213 14:07:30.427663 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.427873 kubelet[2604]: E1213 14:07:30.427850 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.427873 kubelet[2604]: W1213 14:07:30.427865 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.427939 kubelet[2604]: E1213 14:07:30.427875 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.428047 kubelet[2604]: E1213 14:07:30.428020 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.428047 kubelet[2604]: W1213 14:07:30.428041 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.428047 kubelet[2604]: E1213 14:07:30.428049 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.428548 kubelet[2604]: E1213 14:07:30.428200 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.428619 kubelet[2604]: W1213 14:07:30.428565 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.428619 kubelet[2604]: E1213 14:07:30.428579 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.428774 kubelet[2604]: E1213 14:07:30.428757 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.428774 kubelet[2604]: W1213 14:07:30.428771 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.428836 kubelet[2604]: E1213 14:07:30.428785 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.429261 kubelet[2604]: E1213 14:07:30.429245 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.430145 kubelet[2604]: W1213 14:07:30.430128 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.430244 kubelet[2604]: E1213 14:07:30.430232 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.430717 kubelet[2604]: E1213 14:07:30.430502 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.430717 kubelet[2604]: W1213 14:07:30.430521 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.430717 kubelet[2604]: E1213 14:07:30.430539 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.430717 kubelet[2604]: E1213 14:07:30.430703 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.430717 kubelet[2604]: W1213 14:07:30.430711 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.430717 kubelet[2604]: E1213 14:07:30.430720 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.430919 kubelet[2604]: E1213 14:07:30.430887 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.430919 kubelet[2604]: W1213 14:07:30.430901 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.430919 kubelet[2604]: E1213 14:07:30.430911 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.431078 kubelet[2604]: E1213 14:07:30.431051 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.431078 kubelet[2604]: W1213 14:07:30.431073 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.431145 kubelet[2604]: E1213 14:07:30.431081 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.431433 kubelet[2604]: E1213 14:07:30.431418 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.431526 kubelet[2604]: W1213 14:07:30.431513 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.431606 kubelet[2604]: E1213 14:07:30.431594 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.432412 kubelet[2604]: E1213 14:07:30.432395 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.432542 kubelet[2604]: W1213 14:07:30.432527 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.432638 kubelet[2604]: E1213 14:07:30.432614 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.433046 kubelet[2604]: E1213 14:07:30.433029 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.433141 kubelet[2604]: W1213 14:07:30.433128 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.433240 kubelet[2604]: E1213 14:07:30.433214 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.433457 kubelet[2604]: E1213 14:07:30.433445 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.433538 kubelet[2604]: W1213 14:07:30.433526 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.433725 kubelet[2604]: E1213 14:07:30.433697 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.433881 kubelet[2604]: E1213 14:07:30.433869 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.433955 kubelet[2604]: W1213 14:07:30.433943 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.434029 kubelet[2604]: E1213 14:07:30.434011 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.434681 kubelet[2604]: E1213 14:07:30.434251 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.434681 kubelet[2604]: W1213 14:07:30.434290 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.434681 kubelet[2604]: E1213 14:07:30.434308 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.435363 kubelet[2604]: E1213 14:07:30.435336 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.435363 kubelet[2604]: W1213 14:07:30.435358 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.435457 kubelet[2604]: E1213 14:07:30.435375 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:30.436684 kubelet[2604]: E1213 14:07:30.436648 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:30.436684 kubelet[2604]: W1213 14:07:30.436681 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:30.436813 kubelet[2604]: E1213 14:07:30.436696 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.249657 kubelet[2604]: E1213 14:07:31.249614 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:31.325226 kubelet[2604]: E1213 14:07:31.325195 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325226 kubelet[2604]: W1213 14:07:31.325219 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.325408 kubelet[2604]: E1213 14:07:31.325236 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.325408 kubelet[2604]: E1213 14:07:31.325396 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325408 kubelet[2604]: W1213 14:07:31.325405 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.325485 kubelet[2604]: E1213 14:07:31.325413 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.325549 kubelet[2604]: E1213 14:07:31.325530 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325549 kubelet[2604]: W1213 14:07:31.325545 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.325598 kubelet[2604]: E1213 14:07:31.325554 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.325683 kubelet[2604]: E1213 14:07:31.325669 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325683 kubelet[2604]: W1213 14:07:31.325681 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.325732 kubelet[2604]: E1213 14:07:31.325689 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.325829 kubelet[2604]: E1213 14:07:31.325814 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325829 kubelet[2604]: W1213 14:07:31.325826 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.325881 kubelet[2604]: E1213 14:07:31.325834 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.325959 kubelet[2604]: E1213 14:07:31.325945 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.325959 kubelet[2604]: W1213 14:07:31.325957 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326003 kubelet[2604]: E1213 14:07:31.325965 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326084 kubelet[2604]: E1213 14:07:31.326071 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326084 kubelet[2604]: W1213 14:07:31.326083 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326128 kubelet[2604]: E1213 14:07:31.326090 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326229 kubelet[2604]: E1213 14:07:31.326214 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326229 kubelet[2604]: W1213 14:07:31.326226 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326298 kubelet[2604]: E1213 14:07:31.326234 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326415 kubelet[2604]: E1213 14:07:31.326394 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326415 kubelet[2604]: W1213 14:07:31.326411 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326466 kubelet[2604]: E1213 14:07:31.326420 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326549 kubelet[2604]: E1213 14:07:31.326533 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326549 kubelet[2604]: W1213 14:07:31.326544 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326609 kubelet[2604]: E1213 14:07:31.326552 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326701 kubelet[2604]: E1213 14:07:31.326685 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326701 kubelet[2604]: W1213 14:07:31.326697 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326756 kubelet[2604]: E1213 14:07:31.326705 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326832 kubelet[2604]: E1213 14:07:31.326816 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326832 kubelet[2604]: W1213 14:07:31.326830 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.326881 kubelet[2604]: E1213 14:07:31.326838 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.326968 kubelet[2604]: E1213 14:07:31.326953 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.326968 kubelet[2604]: W1213 14:07:31.326965 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.327023 kubelet[2604]: E1213 14:07:31.326973 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.327096 kubelet[2604]: E1213 14:07:31.327082 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.327096 kubelet[2604]: W1213 14:07:31.327093 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.327146 kubelet[2604]: E1213 14:07:31.327101 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.327223 kubelet[2604]: E1213 14:07:31.327208 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.327223 kubelet[2604]: W1213 14:07:31.327220 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.327289 kubelet[2604]: E1213 14:07:31.327229 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.334626 kubelet[2604]: E1213 14:07:31.334590 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.334626 kubelet[2604]: W1213 14:07:31.334611 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.334626 kubelet[2604]: E1213 14:07:31.334624 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.334838 kubelet[2604]: E1213 14:07:31.334815 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.334838 kubelet[2604]: W1213 14:07:31.334829 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.334898 kubelet[2604]: E1213 14:07:31.334840 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.335026 kubelet[2604]: E1213 14:07:31.335006 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.335026 kubelet[2604]: W1213 14:07:31.335019 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.335088 kubelet[2604]: E1213 14:07:31.335030 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.335208 kubelet[2604]: E1213 14:07:31.335186 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.335208 kubelet[2604]: W1213 14:07:31.335201 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.335294 kubelet[2604]: E1213 14:07:31.335214 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.335394 kubelet[2604]: E1213 14:07:31.335375 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.335394 kubelet[2604]: W1213 14:07:31.335388 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.335449 kubelet[2604]: E1213 14:07:31.335399 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.335547 kubelet[2604]: E1213 14:07:31.335529 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.335547 kubelet[2604]: W1213 14:07:31.335541 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.335787 kubelet[2604]: E1213 14:07:31.335549 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.335787 kubelet[2604]: E1213 14:07:31.335696 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.335787 kubelet[2604]: W1213 14:07:31.335703 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.335787 kubelet[2604]: E1213 14:07:31.335714 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336056 kubelet[2604]: E1213 14:07:31.336025 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336056 kubelet[2604]: W1213 14:07:31.336044 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336121 kubelet[2604]: E1213 14:07:31.336103 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336228 kubelet[2604]: E1213 14:07:31.336208 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336228 kubelet[2604]: W1213 14:07:31.336221 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336311 kubelet[2604]: E1213 14:07:31.336301 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336409 kubelet[2604]: E1213 14:07:31.336390 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336409 kubelet[2604]: W1213 14:07:31.336403 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336470 kubelet[2604]: E1213 14:07:31.336414 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336556 kubelet[2604]: E1213 14:07:31.336537 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336556 kubelet[2604]: W1213 14:07:31.336550 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336614 kubelet[2604]: E1213 14:07:31.336558 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336699 kubelet[2604]: E1213 14:07:31.336681 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336699 kubelet[2604]: W1213 14:07:31.336693 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336756 kubelet[2604]: E1213 14:07:31.336704 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.336859 kubelet[2604]: E1213 14:07:31.336841 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.336859 kubelet[2604]: W1213 14:07:31.336852 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.336919 kubelet[2604]: E1213 14:07:31.336860 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.337130 kubelet[2604]: E1213 14:07:31.337096 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.337130 kubelet[2604]: W1213 14:07:31.337111 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.337228 kubelet[2604]: E1213 14:07:31.337192 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.337453 kubelet[2604]: E1213 14:07:31.337426 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.337453 kubelet[2604]: W1213 14:07:31.337442 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.337453 kubelet[2604]: E1213 14:07:31.337453 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.337591 kubelet[2604]: E1213 14:07:31.337573 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.337591 kubelet[2604]: W1213 14:07:31.337587 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.337643 kubelet[2604]: E1213 14:07:31.337595 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.337744 kubelet[2604]: E1213 14:07:31.337727 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.337744 kubelet[2604]: W1213 14:07:31.337738 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.337796 kubelet[2604]: E1213 14:07:31.337747 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.338147 kubelet[2604]: E1213 14:07:31.338096 2604 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:07:31.338147 kubelet[2604]: W1213 14:07:31.338112 2604 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:07:31.338147 kubelet[2604]: E1213 14:07:31.338121 2604 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:07:31.781080 env[1493]: time="2024-12-13T14:07:31.781035473Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:31.788180 env[1493]: time="2024-12-13T14:07:31.788144330Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:31.793937 env[1493]: time="2024-12-13T14:07:31.793905503Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:31.797961 env[1493]: time="2024-12-13T14:07:31.797922833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:31.798622 env[1493]: time="2024-12-13T14:07:31.798581274Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:07:31.802627 env[1493]: time="2024-12-13T14:07:31.802587563Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:07:31.830853 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1171229372.mount: Deactivated successfully. Dec 13 14:07:31.847384 env[1493]: time="2024-12-13T14:07:31.847321228Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2\"" Dec 13 14:07:31.848295 env[1493]: time="2024-12-13T14:07:31.848249230Z" level=info msg="StartContainer for \"4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2\"" Dec 13 14:07:31.873951 systemd[1]: Started cri-containerd-4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2.scope. Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3085 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:31.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323933366132363231336163363836666661376431323339373239 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit: BPF prog-id=128 op=LOAD Dec 13 14:07:31.889000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3085 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:31.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323933366132363231336163363836666661376431323339373239 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit: BPF prog-id=129 op=LOAD Dec 13 14:07:31.889000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3085 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:31.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323933366132363231336163363836666661376431323339373239 Dec 13 14:07:31.889000 audit: BPF prog-id=129 op=UNLOAD Dec 13 14:07:31.889000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { perfmon } for pid=3235 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit[3235]: AVC avc: denied { bpf } for pid=3235 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:31.889000 audit: BPF prog-id=130 op=LOAD Dec 13 14:07:31.889000 audit[3235]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3085 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:31.889000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3461323933366132363231336163363836666661376431323339373239 Dec 13 14:07:31.915760 systemd[1]: cri-containerd-4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2.scope: Deactivated successfully. Dec 13 14:07:31.919000 audit: BPF prog-id=130 op=UNLOAD Dec 13 14:07:31.954077 env[1493]: time="2024-12-13T14:07:31.953967636Z" level=info msg="StartContainer for \"4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2\" returns successfully" Dec 13 14:07:32.045943 systemd[1]: run-containerd-runc-k8s.io-4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2-runc.WSopAU.mount: Deactivated successfully. Dec 13 14:07:32.046055 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2-rootfs.mount: Deactivated successfully. Dec 13 14:07:32.868915 env[1493]: time="2024-12-13T14:07:32.868869016Z" level=info msg="shim disconnected" id=4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2 Dec 13 14:07:32.869478 env[1493]: time="2024-12-13T14:07:32.869450818Z" level=warning msg="cleaning up after shim disconnected" id=4a2936a26213ac686ffa7d1239729cacd2679eaba8b7b9d68076893afcf871a2 namespace=k8s.io Dec 13 14:07:32.869570 env[1493]: time="2024-12-13T14:07:32.869555818Z" level=info msg="cleaning up dead shim" Dec 13 14:07:32.876891 env[1493]: time="2024-12-13T14:07:32.876860075Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:07:32Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3280 runtime=io.containerd.runc.v2\n" Dec 13 14:07:33.249251 kubelet[2604]: E1213 14:07:33.249210 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:33.330363 env[1493]: time="2024-12-13T14:07:33.330327663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:07:35.248860 kubelet[2604]: E1213 14:07:35.248812 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:37.249400 kubelet[2604]: E1213 14:07:37.249354 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:37.832098 env[1493]: time="2024-12-13T14:07:37.832050700Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:37.837528 env[1493]: time="2024-12-13T14:07:37.837492192Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:37.840641 env[1493]: time="2024-12-13T14:07:37.840608518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:37.843691 env[1493]: time="2024-12-13T14:07:37.843666645Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:37.844186 env[1493]: time="2024-12-13T14:07:37.844161286Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:07:37.848169 env[1493]: time="2024-12-13T14:07:37.848113454Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:07:37.875101 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount377320876.mount: Deactivated successfully. Dec 13 14:07:37.891978 env[1493]: time="2024-12-13T14:07:37.891924827Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00\"" Dec 13 14:07:37.893776 env[1493]: time="2024-12-13T14:07:37.893385230Z" level=info msg="StartContainer for \"668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00\"" Dec 13 14:07:37.918708 systemd[1]: run-containerd-runc-k8s.io-668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00-runc.xwecaQ.mount: Deactivated successfully. Dec 13 14:07:37.920191 systemd[1]: Started cri-containerd-668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00.scope. Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.941039 kernel: kauditd_printk_skb: 217 callbacks suppressed Dec 13 14:07:37.941132 kernel: audit: type=1400 audit(1734098857.934:1016): avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3085 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:37.987402 kernel: audit: type=1300 audit(1734098857.934:1016): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3085 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:37.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386535616530313665633639373266633065626637353261616362 Dec 13 14:07:38.014643 kernel: audit: type=1327 audit(1734098857.934:1016): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386535616530313665633639373266633065626637353261616362 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.028428 env[1493]: time="2024-12-13T14:07:38.028387116Z" level=info msg="StartContainer for \"668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00\" returns successfully" Dec 13 14:07:38.034592 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.052842 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.072040 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.089623 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.109225 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.109356 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:38.144120 kernel: audit: type=1400 audit(1734098857.934:1017): avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.934000 audit: BPF prog-id=131 op=LOAD Dec 13 14:07:37.934000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3085 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:37.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386535616530313665633639373266633065626637353261616362 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.940000 audit: BPF prog-id=132 op=LOAD Dec 13 14:07:37.940000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3085 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:37.940000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386535616530313665633639373266633065626637353261616362 Dec 13 14:07:37.957000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:07:37.957000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { perfmon } for pid=3302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit[3302]: AVC avc: denied { bpf } for pid=3302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:37.957000 audit: BPF prog-id=133 op=LOAD Dec 13 14:07:37.957000 audit[3302]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3085 pid=3302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:37.957000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636386535616530313665633639373266633065626637353261616362 Dec 13 14:07:39.030660 env[1493]: time="2024-12-13T14:07:39.030601089Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:07:39.033069 systemd[1]: cri-containerd-668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00.scope: Deactivated successfully. Dec 13 14:07:39.037000 audit: BPF prog-id=133 op=UNLOAD Dec 13 14:07:39.050547 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00-rootfs.mount: Deactivated successfully. Dec 13 14:07:39.076792 kubelet[2604]: I1213 14:07:39.076763 2604 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.105866 2604 topology_manager.go:215] "Topology Admit Handler" podUID="ecad80b3-7c57-49a7-8fb0-b8ee573370c1" podNamespace="kube-system" podName="coredns-7db6d8ff4d-8dlrg" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.115552 2604 topology_manager.go:215] "Topology Admit Handler" podUID="c4170cdc-c9ea-46ee-8122-2b883dffdfa9" podNamespace="calico-apiserver" podName="calico-apiserver-cbb967c57-xj49q" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.116621 2604 topology_manager.go:215] "Topology Admit Handler" podUID="608f4f8e-e27b-4f22-b60f-8faf588975a4" podNamespace="calico-system" podName="calico-kube-controllers-649bd59ff9-48tws" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.127237 2604 topology_manager.go:215] "Topology Admit Handler" podUID="2baf98ac-395c-4d73-805c-2096fee6c424" podNamespace="calico-apiserver" podName="calico-apiserver-cbb967c57-sh2hp" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.127482 2604 topology_manager.go:215] "Topology Admit Handler" podUID="384fd921-b079-428f-a83c-974ac0641f71" podNamespace="kube-system" podName="coredns-7db6d8ff4d-fn5bx" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.295709 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjpbw\" (UniqueName: \"kubernetes.io/projected/2baf98ac-395c-4d73-805c-2096fee6c424-kube-api-access-bjpbw\") pod \"calico-apiserver-cbb967c57-sh2hp\" (UID: \"2baf98ac-395c-4d73-805c-2096fee6c424\") " pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" Dec 13 14:07:39.461549 kubelet[2604]: I1213 14:07:39.295751 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kknnq\" (UniqueName: \"kubernetes.io/projected/608f4f8e-e27b-4f22-b60f-8faf588975a4-kube-api-access-kknnq\") pod \"calico-kube-controllers-649bd59ff9-48tws\" (UID: \"608f4f8e-e27b-4f22-b60f-8faf588975a4\") " pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" Dec 13 14:07:39.111817 systemd[1]: Created slice kubepods-burstable-podecad80b3_7c57_49a7_8fb0_b8ee573370c1.slice. Dec 13 14:07:39.461887 kubelet[2604]: I1213 14:07:39.295775 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/384fd921-b079-428f-a83c-974ac0641f71-config-volume\") pod \"coredns-7db6d8ff4d-fn5bx\" (UID: \"384fd921-b079-428f-a83c-974ac0641f71\") " pod="kube-system/coredns-7db6d8ff4d-fn5bx" Dec 13 14:07:39.461887 kubelet[2604]: I1213 14:07:39.295811 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/ecad80b3-7c57-49a7-8fb0-b8ee573370c1-config-volume\") pod \"coredns-7db6d8ff4d-8dlrg\" (UID: \"ecad80b3-7c57-49a7-8fb0-b8ee573370c1\") " pod="kube-system/coredns-7db6d8ff4d-8dlrg" Dec 13 14:07:39.461887 kubelet[2604]: I1213 14:07:39.295831 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9sscv\" (UniqueName: \"kubernetes.io/projected/ecad80b3-7c57-49a7-8fb0-b8ee573370c1-kube-api-access-9sscv\") pod \"coredns-7db6d8ff4d-8dlrg\" (UID: \"ecad80b3-7c57-49a7-8fb0-b8ee573370c1\") " pod="kube-system/coredns-7db6d8ff4d-8dlrg" Dec 13 14:07:39.461887 kubelet[2604]: I1213 14:07:39.295848 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2baf98ac-395c-4d73-805c-2096fee6c424-calico-apiserver-certs\") pod \"calico-apiserver-cbb967c57-sh2hp\" (UID: \"2baf98ac-395c-4d73-805c-2096fee6c424\") " pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" Dec 13 14:07:39.461887 kubelet[2604]: I1213 14:07:39.295871 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/608f4f8e-e27b-4f22-b60f-8faf588975a4-tigera-ca-bundle\") pod \"calico-kube-controllers-649bd59ff9-48tws\" (UID: \"608f4f8e-e27b-4f22-b60f-8faf588975a4\") " pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" Dec 13 14:07:39.121617 systemd[1]: Created slice kubepods-besteffort-podc4170cdc_c9ea_46ee_8122_2b883dffdfa9.slice. Dec 13 14:07:39.462070 kubelet[2604]: I1213 14:07:39.295887 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ql77b\" (UniqueName: \"kubernetes.io/projected/384fd921-b079-428f-a83c-974ac0641f71-kube-api-access-ql77b\") pod \"coredns-7db6d8ff4d-fn5bx\" (UID: \"384fd921-b079-428f-a83c-974ac0641f71\") " pod="kube-system/coredns-7db6d8ff4d-fn5bx" Dec 13 14:07:39.462070 kubelet[2604]: I1213 14:07:39.295904 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5v6kj\" (UniqueName: \"kubernetes.io/projected/c4170cdc-c9ea-46ee-8122-2b883dffdfa9-kube-api-access-5v6kj\") pod \"calico-apiserver-cbb967c57-xj49q\" (UID: \"c4170cdc-c9ea-46ee-8122-2b883dffdfa9\") " pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" Dec 13 14:07:39.462070 kubelet[2604]: I1213 14:07:39.295923 2604 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/c4170cdc-c9ea-46ee-8122-2b883dffdfa9-calico-apiserver-certs\") pod \"calico-apiserver-cbb967c57-xj49q\" (UID: \"c4170cdc-c9ea-46ee-8122-2b883dffdfa9\") " pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" Dec 13 14:07:39.125487 systemd[1]: Created slice kubepods-besteffort-pod608f4f8e_e27b_4f22_b60f_8faf588975a4.slice. Dec 13 14:07:39.132727 systemd[1]: Created slice kubepods-burstable-pod384fd921_b079_428f_a83c_974ac0641f71.slice. Dec 13 14:07:39.138127 systemd[1]: Created slice kubepods-besteffort-pod2baf98ac_395c_4d73_805c_2096fee6c424.slice. Dec 13 14:07:39.254094 systemd[1]: Created slice kubepods-besteffort-pod4982cd66_aea8_4e3a_8a68_3fc8def21791.slice. Dec 13 14:07:39.463542 env[1493]: time="2024-12-13T14:07:39.463496221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bn7rv,Uid:4982cd66-aea8-4e3a-8a68-3fc8def21791,Namespace:calico-system,Attempt:0,}" Dec 13 14:07:39.760003 env[1493]: time="2024-12-13T14:07:39.759538110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8dlrg,Uid:ecad80b3-7c57-49a7-8fb0-b8ee573370c1,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:39.766047 env[1493]: time="2024-12-13T14:07:39.765814923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-649bd59ff9-48tws,Uid:608f4f8e-e27b-4f22-b60f-8faf588975a4,Namespace:calico-system,Attempt:0,}" Dec 13 14:07:39.770024 env[1493]: time="2024-12-13T14:07:39.769816772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fn5bx,Uid:384fd921-b079-428f-a83c-974ac0641f71,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:39.788259 env[1493]: time="2024-12-13T14:07:39.787972529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-xj49q,Uid:c4170cdc-c9ea-46ee-8122-2b883dffdfa9,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:07:39.788709 env[1493]: time="2024-12-13T14:07:39.788577810Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-sh2hp,Uid:2baf98ac-395c-4d73-805c-2096fee6c424,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:07:40.211619 env[1493]: time="2024-12-13T14:07:40.211573595Z" level=info msg="shim disconnected" id=668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00 Dec 13 14:07:40.212056 env[1493]: time="2024-12-13T14:07:40.212036356Z" level=warning msg="cleaning up after shim disconnected" id=668e5ae016ec6972fc0ebf752aacb36caf76ab031d0ec7456b2a09b61e90af00 namespace=k8s.io Dec 13 14:07:40.212146 env[1493]: time="2024-12-13T14:07:40.212133716Z" level=info msg="cleaning up dead shim" Dec 13 14:07:40.220132 env[1493]: time="2024-12-13T14:07:40.220096812Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:07:40Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3360 runtime=io.containerd.runc.v2\n" Dec 13 14:07:40.352775 env[1493]: time="2024-12-13T14:07:40.352739522Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:07:40.518743 env[1493]: time="2024-12-13T14:07:40.518418018Z" level=error msg="Failed to destroy network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.518975 env[1493]: time="2024-12-13T14:07:40.518936659Z" level=error msg="encountered an error cleaning up failed sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.519024 env[1493]: time="2024-12-13T14:07:40.518994539Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8dlrg,Uid:ecad80b3-7c57-49a7-8fb0-b8ee573370c1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.519260 kubelet[2604]: E1213 14:07:40.519196 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.520973 kubelet[2604]: E1213 14:07:40.519279 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8dlrg" Dec 13 14:07:40.520973 kubelet[2604]: E1213 14:07:40.519313 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-8dlrg" Dec 13 14:07:40.520973 kubelet[2604]: E1213 14:07:40.519358 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-8dlrg_kube-system(ecad80b3-7c57-49a7-8fb0-b8ee573370c1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-8dlrg_kube-system(ecad80b3-7c57-49a7-8fb0-b8ee573370c1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8dlrg" podUID="ecad80b3-7c57-49a7-8fb0-b8ee573370c1" Dec 13 14:07:40.560619 env[1493]: time="2024-12-13T14:07:40.560544664Z" level=error msg="Failed to destroy network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.560966 env[1493]: time="2024-12-13T14:07:40.560920864Z" level=error msg="encountered an error cleaning up failed sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.561023 env[1493]: time="2024-12-13T14:07:40.560980624Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fn5bx,Uid:384fd921-b079-428f-a83c-974ac0641f71,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.561317 kubelet[2604]: E1213 14:07:40.561245 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.561477 kubelet[2604]: E1213 14:07:40.561337 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fn5bx" Dec 13 14:07:40.561477 kubelet[2604]: E1213 14:07:40.561356 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fn5bx" Dec 13 14:07:40.561477 kubelet[2604]: E1213 14:07:40.561397 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-fn5bx_kube-system(384fd921-b079-428f-a83c-974ac0641f71)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-fn5bx_kube-system(384fd921-b079-428f-a83c-974ac0641f71)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fn5bx" podUID="384fd921-b079-428f-a83c-974ac0641f71" Dec 13 14:07:40.575293 env[1493]: time="2024-12-13T14:07:40.575222813Z" level=error msg="Failed to destroy network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.575806 env[1493]: time="2024-12-13T14:07:40.575772334Z" level=error msg="encountered an error cleaning up failed sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.576025 env[1493]: time="2024-12-13T14:07:40.575995295Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-sh2hp,Uid:2baf98ac-395c-4d73-805c-2096fee6c424,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.578152 kubelet[2604]: E1213 14:07:40.576343 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.578152 kubelet[2604]: E1213 14:07:40.576409 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" Dec 13 14:07:40.578152 kubelet[2604]: E1213 14:07:40.576437 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" Dec 13 14:07:40.578451 kubelet[2604]: E1213 14:07:40.576485 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-cbb967c57-sh2hp_calico-apiserver(2baf98ac-395c-4d73-805c-2096fee6c424)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-cbb967c57-sh2hp_calico-apiserver(2baf98ac-395c-4d73-805c-2096fee6c424)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" podUID="2baf98ac-395c-4d73-805c-2096fee6c424" Dec 13 14:07:40.581821 env[1493]: time="2024-12-13T14:07:40.581781827Z" level=error msg="Failed to destroy network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.582263 env[1493]: time="2024-12-13T14:07:40.582227948Z" level=error msg="encountered an error cleaning up failed sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.582474 env[1493]: time="2024-12-13T14:07:40.582444308Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-649bd59ff9-48tws,Uid:608f4f8e-e27b-4f22-b60f-8faf588975a4,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.584440 kubelet[2604]: E1213 14:07:40.582743 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.584440 kubelet[2604]: E1213 14:07:40.582794 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" Dec 13 14:07:40.584440 kubelet[2604]: E1213 14:07:40.582830 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" Dec 13 14:07:40.584727 kubelet[2604]: E1213 14:07:40.582871 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-649bd59ff9-48tws_calico-system(608f4f8e-e27b-4f22-b60f-8faf588975a4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-649bd59ff9-48tws_calico-system(608f4f8e-e27b-4f22-b60f-8faf588975a4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" podUID="608f4f8e-e27b-4f22-b60f-8faf588975a4" Dec 13 14:07:40.586225 env[1493]: time="2024-12-13T14:07:40.586174756Z" level=error msg="Failed to destroy network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.586607 env[1493]: time="2024-12-13T14:07:40.586537236Z" level=error msg="encountered an error cleaning up failed sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.586607 env[1493]: time="2024-12-13T14:07:40.586592156Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bn7rv,Uid:4982cd66-aea8-4e3a-8a68-3fc8def21791,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.586821 kubelet[2604]: E1213 14:07:40.586771 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.586883 kubelet[2604]: E1213 14:07:40.586821 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:40.586883 kubelet[2604]: E1213 14:07:40.586840 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-bn7rv" Dec 13 14:07:40.586954 kubelet[2604]: E1213 14:07:40.586883 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-bn7rv_calico-system(4982cd66-aea8-4e3a-8a68-3fc8def21791)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-bn7rv_calico-system(4982cd66-aea8-4e3a-8a68-3fc8def21791)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:40.601040 env[1493]: time="2024-12-13T14:07:40.600987586Z" level=error msg="Failed to destroy network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.601503 env[1493]: time="2024-12-13T14:07:40.601469467Z" level=error msg="encountered an error cleaning up failed sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.601638 env[1493]: time="2024-12-13T14:07:40.601610867Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-xj49q,Uid:c4170cdc-c9ea-46ee-8122-2b883dffdfa9,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.601950 kubelet[2604]: E1213 14:07:40.601907 2604 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:40.602025 kubelet[2604]: E1213 14:07:40.601962 2604 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" Dec 13 14:07:40.602025 kubelet[2604]: E1213 14:07:40.601989 2604 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" Dec 13 14:07:40.602084 kubelet[2604]: E1213 14:07:40.602030 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-cbb967c57-xj49q_calico-apiserver(c4170cdc-c9ea-46ee-8122-2b883dffdfa9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-cbb967c57-xj49q_calico-apiserver(c4170cdc-c9ea-46ee-8122-2b883dffdfa9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" podUID="c4170cdc-c9ea-46ee-8122-2b883dffdfa9" Dec 13 14:07:41.051755 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88-shm.mount: Deactivated successfully. Dec 13 14:07:41.051844 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034-shm.mount: Deactivated successfully. Dec 13 14:07:41.352697 kubelet[2604]: I1213 14:07:41.352461 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:41.353281 env[1493]: time="2024-12-13T14:07:41.353231343Z" level=info msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" Dec 13 14:07:41.357258 kubelet[2604]: I1213 14:07:41.357236 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:41.358050 env[1493]: time="2024-12-13T14:07:41.358017872Z" level=info msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" Dec 13 14:07:41.359745 kubelet[2604]: I1213 14:07:41.359710 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:41.360811 env[1493]: time="2024-12-13T14:07:41.360776718Z" level=info msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" Dec 13 14:07:41.363226 kubelet[2604]: I1213 14:07:41.363181 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:41.363705 env[1493]: time="2024-12-13T14:07:41.363666604Z" level=info msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" Dec 13 14:07:41.366346 kubelet[2604]: I1213 14:07:41.366319 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:41.366822 env[1493]: time="2024-12-13T14:07:41.366791770Z" level=info msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" Dec 13 14:07:41.369014 kubelet[2604]: I1213 14:07:41.368980 2604 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:41.369512 env[1493]: time="2024-12-13T14:07:41.369484295Z" level=info msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" Dec 13 14:07:41.414716 env[1493]: time="2024-12-13T14:07:41.414632106Z" level=error msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" failed" error="failed to destroy network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.414917 kubelet[2604]: E1213 14:07:41.414858 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:41.414977 kubelet[2604]: E1213 14:07:41.414914 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034"} Dec 13 14:07:41.415007 kubelet[2604]: E1213 14:07:41.414979 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"384fd921-b079-428f-a83c-974ac0641f71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.415062 kubelet[2604]: E1213 14:07:41.415003 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"384fd921-b079-428f-a83c-974ac0641f71\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fn5bx" podUID="384fd921-b079-428f-a83c-974ac0641f71" Dec 13 14:07:41.460484 env[1493]: time="2024-12-13T14:07:41.460427157Z" level=error msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" failed" error="failed to destroy network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.460986 kubelet[2604]: E1213 14:07:41.460851 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:41.460986 kubelet[2604]: E1213 14:07:41.460896 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b"} Dec 13 14:07:41.460986 kubelet[2604]: E1213 14:07:41.460934 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"608f4f8e-e27b-4f22-b60f-8faf588975a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.460986 kubelet[2604]: E1213 14:07:41.460957 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"608f4f8e-e27b-4f22-b60f-8faf588975a4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" podUID="608f4f8e-e27b-4f22-b60f-8faf588975a4" Dec 13 14:07:41.464320 env[1493]: time="2024-12-13T14:07:41.464237685Z" level=error msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" failed" error="failed to destroy network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.464686 kubelet[2604]: E1213 14:07:41.464647 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:41.464760 kubelet[2604]: E1213 14:07:41.464692 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c"} Dec 13 14:07:41.464760 kubelet[2604]: E1213 14:07:41.464737 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"ecad80b3-7c57-49a7-8fb0-b8ee573370c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.464836 kubelet[2604]: E1213 14:07:41.464761 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"ecad80b3-7c57-49a7-8fb0-b8ee573370c1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-8dlrg" podUID="ecad80b3-7c57-49a7-8fb0-b8ee573370c1" Dec 13 14:07:41.474359 env[1493]: time="2024-12-13T14:07:41.474309705Z" level=error msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" failed" error="failed to destroy network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.474714 kubelet[2604]: E1213 14:07:41.474595 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:41.474714 kubelet[2604]: E1213 14:07:41.474637 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88"} Dec 13 14:07:41.474714 kubelet[2604]: E1213 14:07:41.474667 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4982cd66-aea8-4e3a-8a68-3fc8def21791\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.474714 kubelet[2604]: E1213 14:07:41.474688 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4982cd66-aea8-4e3a-8a68-3fc8def21791\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-bn7rv" podUID="4982cd66-aea8-4e3a-8a68-3fc8def21791" Dec 13 14:07:41.477948 env[1493]: time="2024-12-13T14:07:41.477902232Z" level=error msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" failed" error="failed to destroy network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.478340 kubelet[2604]: E1213 14:07:41.478250 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:41.478410 kubelet[2604]: E1213 14:07:41.478349 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89"} Dec 13 14:07:41.478410 kubelet[2604]: E1213 14:07:41.478379 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c4170cdc-c9ea-46ee-8122-2b883dffdfa9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.478493 kubelet[2604]: E1213 14:07:41.478417 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c4170cdc-c9ea-46ee-8122-2b883dffdfa9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" podUID="c4170cdc-c9ea-46ee-8122-2b883dffdfa9" Dec 13 14:07:41.488475 env[1493]: time="2024-12-13T14:07:41.488426053Z" level=error msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" failed" error="failed to destroy network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:07:41.488843 kubelet[2604]: E1213 14:07:41.488791 2604 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:41.488913 kubelet[2604]: E1213 14:07:41.488860 2604 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425"} Dec 13 14:07:41.488913 kubelet[2604]: E1213 14:07:41.488891 2604 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2baf98ac-395c-4d73-805c-2096fee6c424\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:07:41.489022 kubelet[2604]: E1213 14:07:41.488913 2604 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2baf98ac-395c-4d73-805c-2096fee6c424\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" podUID="2baf98ac-395c-4d73-805c-2096fee6c424" Dec 13 14:07:47.335422 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3263620411.mount: Deactivated successfully. Dec 13 14:07:47.411842 env[1493]: time="2024-12-13T14:07:47.411796050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:47.423192 env[1493]: time="2024-12-13T14:07:47.423155311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:47.427730 env[1493]: time="2024-12-13T14:07:47.427684480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:47.432150 env[1493]: time="2024-12-13T14:07:47.432109568Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:47.432521 env[1493]: time="2024-12-13T14:07:47.432485528Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:07:47.447745 env[1493]: time="2024-12-13T14:07:47.447702837Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:07:47.479315 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1847314847.mount: Deactivated successfully. Dec 13 14:07:47.495818 env[1493]: time="2024-12-13T14:07:47.495770605Z" level=info msg="CreateContainer within sandbox \"9a3fcc6ff8a464484743b3f54b172ccc12fb3377cb205200fdb477106fb81478\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12\"" Dec 13 14:07:47.498106 env[1493]: time="2024-12-13T14:07:47.498076610Z" level=info msg="StartContainer for \"89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12\"" Dec 13 14:07:47.516095 systemd[1]: Started cri-containerd-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12.scope. Dec 13 14:07:47.557371 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:07:47.557496 kernel: audit: type=1400 audit(1734098867.533:1023): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3085 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:47.583994 kernel: audit: type=1300 audit(1734098867.533:1023): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3085 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:47.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839616635323634383035376366376638373030316235306233306562 Dec 13 14:07:47.609237 kernel: audit: type=1327 audit(1734098867.533:1023): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839616635323634383035376366376638373030316235306233306562 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.626892 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.644741 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.662498 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.668976 env[1493]: time="2024-12-13T14:07:47.668932646Z" level=info msg="StartContainer for \"89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12\" returns successfully" Dec 13 14:07:47.680321 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.699557 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.719648 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.739711 kernel: audit: type=1400 audit(1734098867.533:1024): avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.533000 audit: BPF prog-id=134 op=LOAD Dec 13 14:07:47.533000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3085 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:47.533000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839616635323634383035376366376638373030316235306233306562 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.538000 audit: BPF prog-id=135 op=LOAD Dec 13 14:07:47.538000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3085 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:47.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839616635323634383035376366376638373030316235306233306562 Dec 13 14:07:47.556000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:07:47.556000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { perfmon } for pid=3684 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit[3684]: AVC avc: denied { bpf } for pid=3684 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:47.556000 audit: BPF prog-id=136 op=LOAD Dec 13 14:07:47.556000 audit[3684]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3085 pid=3684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:47.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839616635323634383035376366376638373030316235306233306562 Dec 13 14:07:48.023954 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:07:48.024125 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:07:49.332000 audit[3826]: AVC avc: denied { write } for pid=3826 comm="tee" name="fd" dev="proc" ino=25405 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.332000 audit[3826]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffca009fd a2=241 a3=1b6 items=1 ppid=3777 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.339000 audit[3828]: AVC avc: denied { write } for pid=3828 comm="tee" name="fd" dev="proc" ino=25751 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.339000 audit[3828]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffefa0da0c a2=241 a3=1b6 items=1 ppid=3775 pid=3828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.339000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:07:49.339000 audit: PATH item=0 name="/dev/fd/63" inode=25396 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.332000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:07:49.332000 audit: PATH item=0 name="/dev/fd/63" inode=25395 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.332000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.345000 audit[3833]: AVC avc: denied { write } for pid=3833 comm="tee" name="fd" dev="proc" ino=25416 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.347000 audit[3835]: AVC avc: denied { write } for pid=3835 comm="tee" name="fd" dev="proc" ino=25419 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.354000 audit[3844]: AVC avc: denied { write } for pid=3844 comm="tee" name="fd" dev="proc" ino=25424 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.354000 audit[3844]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe6e2da0d a2=241 a3=1b6 items=1 ppid=3780 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.354000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:07:49.354000 audit: PATH item=0 name="/dev/fd/63" inode=25753 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.354000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.347000 audit[3835]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb61ca0e a2=241 a3=1b6 items=1 ppid=3785 pid=3835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.347000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:07:49.347000 audit: PATH item=0 name="/dev/fd/63" inode=25409 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.345000 audit[3833]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9bb5a0c a2=241 a3=1b6 items=1 ppid=3797 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.347000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.345000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:07:49.345000 audit: PATH item=0 name="/dev/fd/63" inode=25408 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.370000 audit[3849]: AVC avc: denied { write } for pid=3849 comm="tee" name="fd" dev="proc" ino=25768 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.370000 audit[3849]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffca72ca0c a2=241 a3=1b6 items=1 ppid=3789 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.370000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:07:49.370000 audit: PATH item=0 name="/dev/fd/63" inode=25765 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.370000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.379000 audit[3837]: AVC avc: denied { write } for pid=3837 comm="tee" name="fd" dev="proc" ino=25430 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:07:49.379000 audit[3837]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff99589fc a2=241 a3=1b6 items=1 ppid=3783 pid=3837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.379000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:07:49.379000 audit: PATH item=0 name="/dev/fd/63" inode=25748 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:07:49.379000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit: BPF prog-id=137 op=LOAD Dec 13 14:07:49.608000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcd150d78 a2=98 a3=ffffcd150d68 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.608000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.608000 audit: BPF prog-id=138 op=LOAD Dec 13 14:07:49.608000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd150a08 a2=74 a3=95 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.608000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.609000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.609000 audit: BPF prog-id=139 op=LOAD Dec 13 14:07:49.609000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd150a68 a2=94 a3=2 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.609000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.609000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit: BPF prog-id=140 op=LOAD Dec 13 14:07:49.710000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcd150a28 a2=40 a3=ffffcd150a58 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.710000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.710000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:07:49.710000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.710000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcd150b40 a2=50 a3=0 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.710000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150a98 a2=28 a3=ffffcd150bc8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd150ac8 a2=28 a3=ffffcd150bf8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd150978 a2=28 a3=ffffcd150aa8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150ae8 a2=28 a3=ffffcd150c18 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150ac8 a2=28 a3=ffffcd150bf8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150ab8 a2=28 a3=ffffcd150be8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150ae8 a2=28 a3=ffffcd150c18 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd150ac8 a2=28 a3=ffffcd150bf8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd150ae8 a2=28 a3=ffffcd150c18 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcd150ab8 a2=28 a3=ffffcd150be8 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcd150b38 a2=28 a3=ffffcd150c78 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd150870 a2=50 a3=0 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit: BPF prog-id=141 op=LOAD Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcd150878 a2=94 a3=5 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcd150980 a2=50 a3=0 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcd150ac8 a2=4 a3=3 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.719000 audit[3905]: AVC avc: denied { confidentiality } for pid=3905 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.719000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd150aa8 a2=94 a3=6 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.719000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { confidentiality } for pid=3905 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.720000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd150278 a2=94 a3=83 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.720000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { perfmon } for pid=3905 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { bpf } for pid=3905 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.720000 audit[3905]: AVC avc: denied { confidentiality } for pid=3905 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.720000 audit[3905]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcd150278 a2=94 a3=83 items=0 ppid=3776 pid=3905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.720000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.728000 audit: BPF prog-id=142 op=LOAD Dec 13 14:07:49.728000 audit[3908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc85fd7f8 a2=98 a3=ffffc85fd7e8 items=0 ppid=3776 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.728000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:07:49.729000 audit: BPF prog-id=142 op=UNLOAD Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.729000 audit: BPF prog-id=143 op=LOAD Dec 13 14:07:49.729000 audit[3908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc85fd6a8 a2=74 a3=95 items=0 ppid=3776 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.729000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:07:49.730000 audit: BPF prog-id=143 op=UNLOAD Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { perfmon } for pid=3908 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit[3908]: AVC avc: denied { bpf } for pid=3908 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.730000 audit: BPF prog-id=144 op=LOAD Dec 13 14:07:49.730000 audit[3908]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffc85fd6d8 a2=40 a3=ffffc85fd708 items=0 ppid=3776 pid=3908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.730000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:07:49.730000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:07:49.831481 systemd-networkd[1631]: vxlan.calico: Link UP Dec 13 14:07:49.831491 systemd-networkd[1631]: vxlan.calico: Gained carrier Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit: BPF prog-id=145 op=LOAD Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3784818 a2=98 a3=ffffe3784808 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit: BPF prog-id=146 op=LOAD Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe37844f8 a2=74 a3=95 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit: BPF prog-id=146 op=UNLOAD Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit: BPF prog-id=147 op=LOAD Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe3784558 a2=94 a3=2 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit: BPF prog-id=147 op=UNLOAD Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3784588 a2=28 a3=ffffe37846b8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe37845b8 a2=28 a3=ffffe37846e8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe3784468 a2=28 a3=ffffe3784598 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe37845d8 a2=28 a3=ffffe3784708 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe37845b8 a2=28 a3=ffffe37846e8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe37845a8 a2=28 a3=ffffe37846d8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe37845d8 a2=28 a3=ffffe3784708 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe37845b8 a2=28 a3=ffffe37846e8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.854000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.854000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe37845d8 a2=28 a3=ffffe3784708 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.854000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe37845a8 a2=28 a3=ffffe37846d8 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffe3784628 a2=28 a3=ffffe3784768 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit: BPF prog-id=148 op=LOAD Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3784448 a2=40 a3=ffffe3784478 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffe3784470 a2=50 a3=0 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffe3784470 a2=50 a3=0 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit: BPF prog-id=149 op=LOAD Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3783bd8 a2=94 a3=2 items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.855000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { bpf } for pid=3936 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: AVC avc: denied { perfmon } for pid=3936 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.855000 audit[3936]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe3783d68 a2=94 a3=2d items=0 ppid=3776 pid=3936 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.855000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.868000 audit: BPF prog-id=151 op=LOAD Dec 13 14:07:49.868000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe2a5cb58 a2=98 a3=ffffe2a5cb48 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.868000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.873000 audit: BPF prog-id=151 op=UNLOAD Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit: BPF prog-id=152 op=LOAD Dec 13 14:07:49.873000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2a5c7e8 a2=74 a3=95 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.873000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.873000 audit: BPF prog-id=153 op=LOAD Dec 13 14:07:49.873000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2a5c848 a2=94 a3=2 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.874000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.968000 audit: BPF prog-id=154 op=LOAD Dec 13 14:07:49.968000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffe2a5c808 a2=40 a3=ffffe2a5c838 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.968000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.969000 audit: BPF prog-id=154 op=UNLOAD Dec 13 14:07:49.969000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.969000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffe2a5c920 a2=50 a3=0 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.969000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.978000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.978000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c878 a2=28 a3=ffffe2a5c9a8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.978000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.978000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2a5c8a8 a2=28 a3=ffffe2a5c9d8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.978000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.978000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2a5c758 a2=28 a3=ffffe2a5c888 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.978000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.978000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c8c8 a2=28 a3=ffffe2a5c9f8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.978000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.978000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c8a8 a2=28 a3=ffffe2a5c9d8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.978000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c898 a2=28 a3=ffffe2a5c9c8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c8c8 a2=28 a3=ffffe2a5c9f8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2a5c8a8 a2=28 a3=ffffe2a5c9d8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2a5c8c8 a2=28 a3=ffffe2a5c9f8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffe2a5c898 a2=28 a3=ffffe2a5c9c8 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.979000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.979000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffe2a5c918 a2=28 a3=ffffe2a5ca58 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2a5c650 a2=50 a3=0 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.980000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.980000 audit: BPF prog-id=155 op=LOAD Dec 13 14:07:49.980000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffe2a5c658 a2=94 a3=5 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.980000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.981000 audit: BPF prog-id=155 op=UNLOAD Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffe2a5c760 a2=50 a3=0 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffe2a5c8a8 a2=4 a3=3 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.981000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.981000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2a5c888 a2=94 a3=6 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.981000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.982000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2a5c058 a2=94 a3=83 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { perfmon } for pid=3941 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.982000 audit[3941]: AVC avc: denied { confidentiality } for pid=3941 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:07:49.982000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffe2a5c058 a2=94 a3=83 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.982000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.983000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.983000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2a5da98 a2=10 a3=ffffe2a5db88 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.983000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.983000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2a5d958 a2=10 a3=ffffe2a5da48 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.983000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.984000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.984000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2a5d8c8 a2=10 a3=ffffe2a5da48 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.984000 audit[3941]: AVC avc: denied { bpf } for pid=3941 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.984000 audit[3941]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2a5d8c8 a2=10 a3=ffffe2a5da48 items=0 ppid=3776 pid=3941 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:07:49.990000 audit: BPF prog-id=150 op=UNLOAD Dec 13 14:07:50.135000 audit[3966]: NETFILTER_CFG table=mangle:100 family=2 entries=16 op=nft_register_chain pid=3966 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:50.135000 audit[3966]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd7c94870 a2=0 a3=ffff9d45cfa8 items=0 ppid=3776 pid=3966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:50.135000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:50.146000 audit[3965]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3965 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:50.146000 audit[3965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffff4fed10 a2=0 a3=ffff9dc8dfa8 items=0 ppid=3776 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:50.146000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:50.174000 audit[3969]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3969 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:50.174000 audit[3969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff5bcca60 a2=0 a3=ffffb6807fa8 items=0 ppid=3776 pid=3969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:50.174000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:50.198000 audit[3964]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3964 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:50.198000 audit[3964]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffcc95d3e0 a2=0 a3=ffffa706bfa8 items=0 ppid=3776 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:50.198000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:51.686382 systemd-networkd[1631]: vxlan.calico: Gained IPv6LL Dec 13 14:07:54.252164 env[1493]: time="2024-12-13T14:07:54.250400602Z" level=info msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" Dec 13 14:07:54.252779 env[1493]: time="2024-12-13T14:07:54.252738845Z" level=info msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" Dec 13 14:07:54.253004 env[1493]: time="2024-12-13T14:07:54.252981166Z" level=info msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" Dec 13 14:07:54.342400 kubelet[2604]: I1213 14:07:54.340788 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-tgpv6" podStartSLOduration=7.597860352 podStartE2EDuration="27.340772315s" podCreationTimestamp="2024-12-13 14:07:27 +0000 UTC" firstStartedPulling="2024-12-13 14:07:27.690989088 +0000 UTC m=+25.574423214" lastFinishedPulling="2024-12-13 14:07:47.433901051 +0000 UTC m=+45.317335177" observedRunningTime="2024-12-13 14:07:48.414516294 +0000 UTC m=+46.297950420" watchObservedRunningTime="2024-12-13 14:07:54.340772315 +0000 UTC m=+52.224206441" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.341 [INFO][4018] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.341 [INFO][4018] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" iface="eth0" netns="/var/run/netns/cni-953f47a6-de49-4ec2-f775-d42670a4f781" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.341 [INFO][4018] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" iface="eth0" netns="/var/run/netns/cni-953f47a6-de49-4ec2-f775-d42670a4f781" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.343 [INFO][4018] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" iface="eth0" netns="/var/run/netns/cni-953f47a6-de49-4ec2-f775-d42670a4f781" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.343 [INFO][4018] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.343 [INFO][4018] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.403 [INFO][4039] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.407 [INFO][4039] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.407 [INFO][4039] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.416 [WARNING][4039] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.416 [INFO][4039] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.425 [INFO][4039] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:54.437146 env[1493]: 2024-12-13 14:07:54.435 [INFO][4018] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:07:54.439357 systemd[1]: run-netns-cni\x2d953f47a6\x2dde49\x2d4ec2\x2df775\x2dd42670a4f781.mount: Deactivated successfully. Dec 13 14:07:54.442421 env[1493]: time="2024-12-13T14:07:54.440472525Z" level=info msg="TearDown network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" successfully" Dec 13 14:07:54.442421 env[1493]: time="2024-12-13T14:07:54.440509525Z" level=info msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" returns successfully" Dec 13 14:07:54.442781 env[1493]: time="2024-12-13T14:07:54.442751729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-sh2hp,Uid:2baf98ac-395c-4d73-805c-2096fee6c424,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.357 [INFO][4026] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.357 [INFO][4026] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" iface="eth0" netns="/var/run/netns/cni-ebca8963-4914-25fd-5bdd-d6c7370455d2" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.357 [INFO][4026] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" iface="eth0" netns="/var/run/netns/cni-ebca8963-4914-25fd-5bdd-d6c7370455d2" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.357 [INFO][4026] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" iface="eth0" netns="/var/run/netns/cni-ebca8963-4914-25fd-5bdd-d6c7370455d2" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.357 [INFO][4026] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.358 [INFO][4026] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.422 [INFO][4044] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.422 [INFO][4044] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.426 [INFO][4044] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.435 [WARNING][4044] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.435 [INFO][4044] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.436 [INFO][4044] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:54.450455 env[1493]: 2024-12-13 14:07:54.446 [INFO][4026] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:07:54.454327 systemd[1]: run-netns-cni\x2debca8963\x2d4914\x2d25fd\x2d5bdd\x2dd6c7370455d2.mount: Deactivated successfully. Dec 13 14:07:54.456141 env[1493]: time="2024-12-13T14:07:54.456103232Z" level=info msg="TearDown network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" successfully" Dec 13 14:07:54.456248 env[1493]: time="2024-12-13T14:07:54.456232192Z" level=info msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" returns successfully" Dec 13 14:07:54.458659 env[1493]: time="2024-12-13T14:07:54.458626356Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-649bd59ff9-48tws,Uid:608f4f8e-e27b-4f22-b60f-8faf588975a4,Namespace:calico-system,Attempt:1,}" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" iface="eth0" netns="/var/run/netns/cni-279ac805-6fba-0c1f-336a-ce9ba02aff5b" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" iface="eth0" netns="/var/run/netns/cni-279ac805-6fba-0c1f-336a-ce9ba02aff5b" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" iface="eth0" netns="/var/run/netns/cni-279ac805-6fba-0c1f-336a-ce9ba02aff5b" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.372 [INFO][4017] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.438 [INFO][4046] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.438 [INFO][4046] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.439 [INFO][4046] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.449 [WARNING][4046] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.449 [INFO][4046] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.458 [INFO][4046] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:54.465895 env[1493]: 2024-12-13 14:07:54.460 [INFO][4017] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:07:54.465895 env[1493]: time="2024-12-13T14:07:54.465370168Z" level=info msg="TearDown network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" successfully" Dec 13 14:07:54.465895 env[1493]: time="2024-12-13T14:07:54.465419448Z" level=info msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" returns successfully" Dec 13 14:07:54.464736 systemd[1]: run-netns-cni\x2d279ac805\x2d6fba\x2d0c1f\x2d336a\x2dce9ba02aff5b.mount: Deactivated successfully. Dec 13 14:07:54.467796 env[1493]: time="2024-12-13T14:07:54.466365209Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8dlrg,Uid:ecad80b3-7c57-49a7-8fb0-b8ee573370c1,Namespace:kube-system,Attempt:1,}" Dec 13 14:07:55.250182 env[1493]: time="2024-12-13T14:07:55.250134460Z" level=info msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" Dec 13 14:07:55.251302 env[1493]: time="2024-12-13T14:07:55.250151740Z" level=info msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.312 [INFO][4090] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.312 [INFO][4090] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" iface="eth0" netns="/var/run/netns/cni-453217f6-89a6-be56-9432-48b6a087b3cc" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.313 [INFO][4090] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" iface="eth0" netns="/var/run/netns/cni-453217f6-89a6-be56-9432-48b6a087b3cc" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.316 [INFO][4090] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" iface="eth0" netns="/var/run/netns/cni-453217f6-89a6-be56-9432-48b6a087b3cc" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.317 [INFO][4090] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.317 [INFO][4090] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.364 [INFO][4108] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.365 [INFO][4108] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.365 [INFO][4108] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.373 [WARNING][4108] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.373 [INFO][4108] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.378 [INFO][4108] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:55.385081 env[1493]: 2024-12-13 14:07:55.380 [INFO][4090] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:07:55.385746 env[1493]: time="2024-12-13T14:07:55.385276248Z" level=info msg="TearDown network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" successfully" Dec 13 14:07:55.385746 env[1493]: time="2024-12-13T14:07:55.385308488Z" level=info msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" returns successfully" Dec 13 14:07:55.386093 env[1493]: time="2024-12-13T14:07:55.386059889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bn7rv,Uid:4982cd66-aea8-4e3a-8a68-3fc8def21791,Namespace:calico-system,Attempt:1,}" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.334 [INFO][4100] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.341 [INFO][4100] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" iface="eth0" netns="/var/run/netns/cni-5d03bafe-56c8-0791-54de-2a5adf540af8" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.341 [INFO][4100] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" iface="eth0" netns="/var/run/netns/cni-5d03bafe-56c8-0791-54de-2a5adf540af8" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.341 [INFO][4100] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" iface="eth0" netns="/var/run/netns/cni-5d03bafe-56c8-0791-54de-2a5adf540af8" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.341 [INFO][4100] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.341 [INFO][4100] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.373 [INFO][4113] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.373 [INFO][4113] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.381 [INFO][4113] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.393 [WARNING][4113] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.393 [INFO][4113] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.395 [INFO][4113] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:55.402263 env[1493]: 2024-12-13 14:07:55.396 [INFO][4100] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:07:55.402944 env[1493]: time="2024-12-13T14:07:55.402905397Z" level=info msg="TearDown network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" successfully" Dec 13 14:07:55.403002 env[1493]: time="2024-12-13T14:07:55.402947477Z" level=info msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" returns successfully" Dec 13 14:07:55.403837 env[1493]: time="2024-12-13T14:07:55.403785359Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fn5bx,Uid:384fd921-b079-428f-a83c-974ac0641f71,Namespace:kube-system,Attempt:1,}" Dec 13 14:07:55.441196 systemd[1]: run-netns-cni\x2d453217f6\x2d89a6\x2dbe56\x2d9432\x2d48b6a087b3cc.mount: Deactivated successfully. Dec 13 14:07:55.441288 systemd[1]: run-netns-cni\x2d5d03bafe\x2d56c8\x2d0791\x2d54de\x2d2a5adf540af8.mount: Deactivated successfully. Dec 13 14:07:55.596547 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:07:55.596687 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calicbe2880d983: link becomes ready Dec 13 14:07:55.600001 systemd-networkd[1631]: calicbe2880d983: Link UP Dec 13 14:07:55.602281 systemd-networkd[1631]: calicbe2880d983: Gained carrier Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.480 [INFO][4130] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0 coredns-7db6d8ff4d- kube-system ecad80b3-7c57-49a7-8fb0-b8ee573370c1 796 0 2024-12-13 14:07:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 coredns-7db6d8ff4d-8dlrg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calicbe2880d983 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.481 [INFO][4130] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.533 [INFO][4156] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" HandleID="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.546 [INFO][4156] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" HandleID="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a1620), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"coredns-7db6d8ff4d-8dlrg", "timestamp":"2024-12-13 14:07:55.533671218 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.546 [INFO][4156] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.546 [INFO][4156] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.547 [INFO][4156] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.549 [INFO][4156] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.553 [INFO][4156] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.557 [INFO][4156] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.559 [INFO][4156] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.561 [INFO][4156] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.561 [INFO][4156] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.562 [INFO][4156] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49 Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.569 [INFO][4156] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.576 [INFO][4156] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.1/26] block=192.168.83.0/26 handle="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.576 [INFO][4156] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.1/26] handle="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.576 [INFO][4156] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:55.649094 env[1493]: 2024-12-13 14:07:55.576 [INFO][4156] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.1/26] IPv6=[] ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" HandleID="k8s-pod-network.4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.579 [INFO][4130] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ecad80b3-7c57-49a7-8fb0-b8ee573370c1", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"coredns-7db6d8ff4d-8dlrg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbe2880d983", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.579 [INFO][4130] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.1/32] ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.579 [INFO][4130] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calicbe2880d983 ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.604 [INFO][4130] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.604 [INFO][4130] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ecad80b3-7c57-49a7-8fb0-b8ee573370c1", ResourceVersion:"796", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49", Pod:"coredns-7db6d8ff4d-8dlrg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbe2880d983", MAC:"5e:d1:0e:73:3b:7b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.653377 env[1493]: 2024-12-13 14:07:55.642 [INFO][4130] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49" Namespace="kube-system" Pod="coredns-7db6d8ff4d-8dlrg" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:07:55.682527 kernel: kauditd_printk_skb: 556 callbacks suppressed Dec 13 14:07:55.682675 kernel: audit: type=1325 audit(1734098875.665:1131): table=filter:104 family=2 entries=34 op=nft_register_chain pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:55.665000 audit[4206]: NETFILTER_CFG table=filter:104 family=2 entries=34 op=nft_register_chain pid=4206 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:55.665000 audit[4206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc27b31c0 a2=0 a3=ffff95f90fa8 items=0 ppid=3776 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.720195 kernel: audit: type=1300 audit(1734098875.665:1131): arch=c00000b7 syscall=211 success=yes exit=19148 a0=3 a1=ffffc27b31c0 a2=0 a3=ffff95f90fa8 items=0 ppid=3776 pid=4206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.665000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:55.739844 kernel: audit: type=1327 audit(1734098875.665:1131): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:55.778291 systemd-networkd[1631]: cali767a9e90a0d: Link UP Dec 13 14:07:55.786078 systemd-networkd[1631]: cali767a9e90a0d: Gained carrier Dec 13 14:07:55.786361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali767a9e90a0d: link becomes ready Dec 13 14:07:55.796124 env[1493]: time="2024-12-13T14:07:55.796033660Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:55.796420 env[1493]: time="2024-12-13T14:07:55.796378780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:55.796538 env[1493]: time="2024-12-13T14:07:55.796424020Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:55.801297 env[1493]: time="2024-12-13T14:07:55.800287507Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49 pid=4233 runtime=io.containerd.runc.v2 Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.455 [INFO][4120] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0 calico-apiserver-cbb967c57- calico-apiserver 2baf98ac-395c-4d73-805c-2096fee6c424 794 0 2024-12-13 14:07:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:cbb967c57 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 calico-apiserver-cbb967c57-sh2hp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali767a9e90a0d [] []}} ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.455 [INFO][4120] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.608 [INFO][4155] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" HandleID="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.641 [INFO][4155] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" HandleID="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400028cc10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"calico-apiserver-cbb967c57-sh2hp", "timestamp":"2024-12-13 14:07:55.608339583 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.641 [INFO][4155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.641 [INFO][4155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.641 [INFO][4155] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.649 [INFO][4155] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.667 [INFO][4155] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.715 [INFO][4155] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.721 [INFO][4155] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.742 [INFO][4155] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.743 [INFO][4155] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.745 [INFO][4155] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993 Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.751 [INFO][4155] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.757 [INFO][4155] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.2/26] block=192.168.83.0/26 handle="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.757 [INFO][4155] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.2/26] handle="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.758 [INFO][4155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:55.807215 env[1493]: 2024-12-13 14:07:55.760 [INFO][4155] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.2/26] IPv6=[] ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" HandleID="k8s-pod-network.114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.763 [INFO][4120] cni-plugin/k8s.go 386: Populated endpoint ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"2baf98ac-395c-4d73-805c-2096fee6c424", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"calico-apiserver-cbb967c57-sh2hp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali767a9e90a0d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.763 [INFO][4120] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.2/32] ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.763 [INFO][4120] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali767a9e90a0d ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.786 [INFO][4120] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.789 [INFO][4120] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"2baf98ac-395c-4d73-805c-2096fee6c424", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993", Pod:"calico-apiserver-cbb967c57-sh2hp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali767a9e90a0d", MAC:"22:43:ca:49:5a:fa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.808042 env[1493]: 2024-12-13 14:07:55.802 [INFO][4120] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-sh2hp" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:07:55.821185 systemd-networkd[1631]: caliba050b2ff06: Link UP Dec 13 14:07:55.828759 systemd-networkd[1631]: caliba050b2ff06: Gained carrier Dec 13 14:07:55.829299 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliba050b2ff06: link becomes ready Dec 13 14:07:55.832000 audit[4248]: NETFILTER_CFG table=filter:105 family=2 entries=44 op=nft_register_chain pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.533 [INFO][4142] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0 calico-kube-controllers-649bd59ff9- calico-system 608f4f8e-e27b-4f22-b60f-8faf588975a4 795 0 2024-12-13 14:07:27 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:649bd59ff9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 calico-kube-controllers-649bd59ff9-48tws eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliba050b2ff06 [] []}} ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.534 [INFO][4142] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.676 [INFO][4180] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" HandleID="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.721 [INFO][4180] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" HandleID="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000399c60), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"calico-kube-controllers-649bd59ff9-48tws", "timestamp":"2024-12-13 14:07:55.676053618 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.721 [INFO][4180] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.757 [INFO][4180] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.757 [INFO][4180] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.759 [INFO][4180] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.763 [INFO][4180] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.770 [INFO][4180] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.771 [INFO][4180] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.774 [INFO][4180] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.774 [INFO][4180] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.785 [INFO][4180] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8 Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.795 [INFO][4180] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.805 [INFO][4180] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.3/26] block=192.168.83.0/26 handle="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.805 [INFO][4180] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.3/26] handle="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.805 [INFO][4180] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:55.852695 env[1493]: 2024-12-13 14:07:55.805 [INFO][4180] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.3/26] IPv6=[] ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" HandleID="k8s-pod-network.cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.809 [INFO][4142] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0", GenerateName:"calico-kube-controllers-649bd59ff9-", Namespace:"calico-system", SelfLink:"", UID:"608f4f8e-e27b-4f22-b60f-8faf588975a4", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"649bd59ff9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"calico-kube-controllers-649bd59ff9-48tws", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba050b2ff06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.810 [INFO][4142] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.3/32] ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.810 [INFO][4142] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliba050b2ff06 ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.829 [INFO][4142] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.829 [INFO][4142] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0", GenerateName:"calico-kube-controllers-649bd59ff9-", Namespace:"calico-system", SelfLink:"", UID:"608f4f8e-e27b-4f22-b60f-8faf588975a4", ResourceVersion:"795", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"649bd59ff9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8", Pod:"calico-kube-controllers-649bd59ff9-48tws", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba050b2ff06", MAC:"7e:95:fa:b1:12:7b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:55.854584 env[1493]: 2024-12-13 14:07:55.843 [INFO][4142] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8" Namespace="calico-system" Pod="calico-kube-controllers-649bd59ff9-48tws" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:07:55.855331 kernel: audit: type=1325 audit(1734098875.832:1132): table=filter:105 family=2 entries=44 op=nft_register_chain pid=4248 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:55.832000 audit[4248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24680 a0=3 a1=ffffc12de170 a2=0 a3=ffffb1cb7fa8 items=0 ppid=3776 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.832000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:55.901312 systemd[1]: Started cri-containerd-4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49.scope. Dec 13 14:07:55.918990 kernel: audit: type=1300 audit(1734098875.832:1132): arch=c00000b7 syscall=211 success=yes exit=24680 a0=3 a1=ffffc12de170 a2=0 a3=ffffb1cb7fa8 items=0 ppid=3776 pid=4248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.920718 kernel: audit: type=1327 audit(1734098875.832:1132): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:55.937147 env[1493]: time="2024-12-13T14:07:55.936861497Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:55.937147 env[1493]: time="2024-12-13T14:07:55.936923537Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:55.937147 env[1493]: time="2024-12-13T14:07:55.936934617Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:55.937795 env[1493]: time="2024-12-13T14:07:55.937747698Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993 pid=4294 runtime=io.containerd.runc.v2 Dec 13 14:07:55.944504 env[1493]: time="2024-12-13T14:07:55.944368590Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:55.944504 env[1493]: time="2024-12-13T14:07:55.944411630Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:55.944504 env[1493]: time="2024-12-13T14:07:55.944422150Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:55.950355 env[1493]: time="2024-12-13T14:07:55.947294955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8 pid=4308 runtime=io.containerd.runc.v2 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.989285 kernel: audit: type=1400 audit(1734098875.951:1133): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.989495 kernel: audit: type=1400 audit(1734098875.951:1134): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.993981 systemd[1]: Started cri-containerd-114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993.scope. Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.020804 kernel: audit: type=1400 audit(1734098875.951:1135): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.020915 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali544322d893b: link becomes ready Dec 13 14:07:56.036663 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:07:56.034598 systemd-networkd[1631]: cali544322d893b: Link UP Dec 13 14:07:56.036418 systemd-networkd[1631]: cali544322d893b: Gained carrier Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit: BPF prog-id=156 op=LOAD Dec 13 14:07:55.951000 audit[4289]: NETFILTER_CFG table=filter:106 family=2 entries=42 op=nft_register_chain pid=4289 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:55.951000 audit[4289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21524 a0=3 a1=ffffebf307c0 a2=0 a3=ffffb5d0afa8 items=0 ppid=3776 pid=4289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.951000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4233 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465646630316563353039376332666231386565653935643935316532 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4233 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465646630316563353039376332666231386565653935643935316532 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.951000 audit: BPF prog-id=157 op=LOAD Dec 13 14:07:55.951000 audit[4247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4233 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465646630316563353039376332666231386565653935643935316532 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.985000 audit: BPF prog-id=158 op=LOAD Dec 13 14:07:55.985000 audit[4247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4233 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465646630316563353039376332666231386565653935643935316532 Dec 13 14:07:55.988000 audit: BPF prog-id=158 op=UNLOAD Dec 13 14:07:55.988000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { perfmon } for pid=4247 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit[4247]: AVC avc: denied { bpf } for pid=4247 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.988000 audit: BPF prog-id=159 op=LOAD Dec 13 14:07:55.988000 audit[4247]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4233 pid=4247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.988000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465646630316563353039376332666231386565653935643935316532 Dec 13 14:07:56.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.079153 systemd[1]: Started cri-containerd-cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8.scope. Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.654 [INFO][4165] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0 coredns-7db6d8ff4d- kube-system 384fd921-b079-428f-a83c-974ac0641f71 802 0 2024-12-13 14:07:18 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 coredns-7db6d8ff4d-fn5bx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali544322d893b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.654 [INFO][4165] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.855 [INFO][4210] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" HandleID="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.888 [INFO][4210] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" HandleID="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011d1f0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"coredns-7db6d8ff4d-fn5bx", "timestamp":"2024-12-13 14:07:55.85577308 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.888 [INFO][4210] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.888 [INFO][4210] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.889 [INFO][4210] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.891 [INFO][4210] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.896 [INFO][4210] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.917 [INFO][4210] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.921 [INFO][4210] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.932 [INFO][4210] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.932 [INFO][4210] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.936 [INFO][4210] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05 Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.944 [INFO][4210] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.973 [INFO][4210] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.4/26] block=192.168.83.0/26 handle="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.973 [INFO][4210] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.4/26] handle="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.973 [INFO][4210] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:56.091897 env[1493]: 2024-12-13 14:07:55.973 [INFO][4210] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.4/26] IPv6=[] ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" HandleID="k8s-pod-network.4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:55.992 [INFO][4165] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"384fd921-b079-428f-a83c-974ac0641f71", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"coredns-7db6d8ff4d-fn5bx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali544322d893b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:55.993 [INFO][4165] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.4/32] ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:55.993 [INFO][4165] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali544322d893b ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:56.018 [INFO][4165] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:56.019 [INFO][4165] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"384fd921-b079-428f-a83c-974ac0641f71", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05", Pod:"coredns-7db6d8ff4d-fn5bx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali544322d893b", MAC:"aa:01:a4:67:9e:ae", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.092573 env[1493]: 2024-12-13 14:07:56.087 [INFO][4165] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fn5bx" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:07:56.095077 env[1493]: time="2024-12-13T14:07:56.095044562Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-8dlrg,Uid:ecad80b3-7c57-49a7-8fb0-b8ee573370c1,Namespace:kube-system,Attempt:1,} returns sandbox id \"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49\"" Dec 13 14:07:56.099039 env[1493]: time="2024-12-13T14:07:56.098970288Z" level=info msg="CreateContainer within sandbox \"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:07:56.126582 systemd-networkd[1631]: calife023dbcdd6: Link UP Dec 13 14:07:56.134361 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calife023dbcdd6: link becomes ready Dec 13 14:07:56.135999 systemd-networkd[1631]: calife023dbcdd6: Gained carrier Dec 13 14:07:56.139289 env[1493]: time="2024-12-13T14:07:56.139231796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-sh2hp,Uid:2baf98ac-395c-4d73-805c-2096fee6c424,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993\"" Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.142000 audit: BPF prog-id=164 op=LOAD Dec 13 14:07:56.143000 audit[4383]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4383 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4308 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366373730303535373939333664656533343439323137363765306431 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4308 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366373730303535373939333664656533343439323137363765306431 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit: BPF prog-id=165 op=LOAD Dec 13 14:07:56.143000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4308 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366373730303535373939333664656533343439323137363765306431 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.143000 audit: BPF prog-id=166 op=LOAD Dec 13 14:07:56.143000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4308 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366373730303535373939333664656533343439323137363765306431 Dec 13 14:07:56.144000 audit: BPF prog-id=166 op=UNLOAD Dec 13 14:07:56.144000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { perfmon } for pid=4327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit[4327]: AVC avc: denied { bpf } for pid=4327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.144000 audit: BPF prog-id=167 op=LOAD Dec 13 14:07:56.144000 audit[4327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4308 pid=4327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366373730303535373939333664656533343439323137363765306431 Dec 13 14:07:56.143000 audit[4383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19408 a0=3 a1=ffffc467ffe0 a2=0 a3=ffffbcecdfa8 items=0 ppid=3776 pid=4383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.143000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:56.151523 env[1493]: time="2024-12-13T14:07:56.147469689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:07:56.158230 env[1493]: time="2024-12-13T14:07:56.153711100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:56.158230 env[1493]: time="2024-12-13T14:07:56.153751620Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:56.158230 env[1493]: time="2024-12-13T14:07:56.153761820Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:56.158230 env[1493]: time="2024-12-13T14:07:56.153862860Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05 pid=4391 runtime=io.containerd.runc.v2 Dec 13 14:07:56.175000 audit[4405]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=4405 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:56.175000 audit[4405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22204 a0=3 a1=fffff861b230 a2=0 a3=ffff90ca2fa8 items=0 ppid=3776 pid=4405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.175000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.742 [INFO][4174] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0 csi-node-driver- calico-system 4982cd66-aea8-4e3a-8a68-3fc8def21791 801 0 2024-12-13 14:07:27 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:65bf684474 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 csi-node-driver-bn7rv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calife023dbcdd6 [] []}} ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.742 [INFO][4174] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.897 [INFO][4222] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" HandleID="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.936 [INFO][4222] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" HandleID="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400028cae0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"csi-node-driver-bn7rv", "timestamp":"2024-12-13 14:07:55.897666111 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.936 [INFO][4222] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.989 [INFO][4222] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.990 [INFO][4222] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:55.996 [INFO][4222] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.046 [INFO][4222] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.058 [INFO][4222] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.061 [INFO][4222] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.076 [INFO][4222] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.076 [INFO][4222] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.080 [INFO][4222] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.096 [INFO][4222] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.111 [INFO][4222] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.5/26] block=192.168.83.0/26 handle="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.111 [INFO][4222] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.5/26] handle="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.111 [INFO][4222] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:56.179298 env[1493]: 2024-12-13 14:07:56.111 [INFO][4222] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.5/26] IPv6=[] ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" HandleID="k8s-pod-network.e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.118 [INFO][4174] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4982cd66-aea8-4e3a-8a68-3fc8def21791", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"csi-node-driver-bn7rv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife023dbcdd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.118 [INFO][4174] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.5/32] ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.118 [INFO][4174] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calife023dbcdd6 ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.139 [INFO][4174] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.139 [INFO][4174] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4982cd66-aea8-4e3a-8a68-3fc8def21791", ResourceVersion:"801", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff", Pod:"csi-node-driver-bn7rv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife023dbcdd6", MAC:"82:af:60:ee:de:07", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.179884 env[1493]: 2024-12-13 14:07:56.159 [INFO][4174] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff" Namespace="calico-system" Pod="csi-node-driver-bn7rv" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:07:56.194969 env[1493]: time="2024-12-13T14:07:56.194929888Z" level=info msg="CreateContainer within sandbox \"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b033c3c082f4a3388feb6436ba481527829f21f3d60bdd85b090f2d8d58102c0\"" Dec 13 14:07:56.197517 env[1493]: time="2024-12-13T14:07:56.197470933Z" level=info msg="StartContainer for \"b033c3c082f4a3388feb6436ba481527829f21f3d60bdd85b090f2d8d58102c0\"" Dec 13 14:07:56.200253 env[1493]: time="2024-12-13T14:07:56.200210297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-649bd59ff9-48tws,Uid:608f4f8e-e27b-4f22-b60f-8faf588975a4,Namespace:calico-system,Attempt:1,} returns sandbox id \"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8\"" Dec 13 14:07:56.208154 systemd[1]: Started cri-containerd-4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05.scope. Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.224000 audit: BPF prog-id=168 op=LOAD Dec 13 14:07:56.225000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.225000 audit[4414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4391 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393832373161393330373331306566623233326466373435336163 Dec 13 14:07:56.225000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.225000 audit[4414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4391 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393832373161393330373331306566623233326466373435336163 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.226000 audit: BPF prog-id=169 op=LOAD Dec 13 14:07:56.226000 audit[4414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4391 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.226000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393832373161393330373331306566623233326466373435336163 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.227000 audit: BPF prog-id=170 op=LOAD Dec 13 14:07:56.227000 audit[4414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4391 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393832373161393330373331306566623233326466373435336163 Dec 13 14:07:56.227000 audit: BPF prog-id=170 op=UNLOAD Dec 13 14:07:56.228000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { perfmon } for pid=4414 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit[4414]: AVC avc: denied { bpf } for pid=4414 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.228000 audit: BPF prog-id=171 op=LOAD Dec 13 14:07:56.228000 audit[4414]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4391 pid=4414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439393832373161393330373331306566623233326466373435336163 Dec 13 14:07:56.231936 env[1493]: time="2024-12-13T14:07:56.231815150Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:56.232141 env[1493]: time="2024-12-13T14:07:56.232103790Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:56.232236 env[1493]: time="2024-12-13T14:07:56.232214951Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:56.234285 env[1493]: time="2024-12-13T14:07:56.234233314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff pid=4460 runtime=io.containerd.runc.v2 Dec 13 14:07:56.239042 systemd[1]: Started cri-containerd-b033c3c082f4a3388feb6436ba481527829f21f3d60bdd85b090f2d8d58102c0.scope. Dec 13 14:07:56.251955 env[1493]: time="2024-12-13T14:07:56.251921823Z" level=info msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.266000 audit: BPF prog-id=172 op=LOAD Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4233 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230333363336330383266346133333838666562363433366261343831 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4233 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230333363336330383266346133333838666562363433366261343831 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit: BPF prog-id=173 op=LOAD Dec 13 14:07:56.269000 audit[4440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4233 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230333363336330383266346133333838666562363433366261343831 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit: BPF prog-id=174 op=LOAD Dec 13 14:07:56.269000 audit[4440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4233 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230333363336330383266346133333838666562363433366261343831 Dec 13 14:07:56.269000 audit: BPF prog-id=174 op=UNLOAD Dec 13 14:07:56.269000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { perfmon } for pid=4440 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit[4440]: AVC avc: denied { bpf } for pid=4440 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.269000 audit: BPF prog-id=175 op=LOAD Dec 13 14:07:56.269000 audit[4440]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4233 pid=4440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.269000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230333363336330383266346133333838666562363433366261343831 Dec 13 14:07:56.272629 env[1493]: time="2024-12-13T14:07:56.272595058Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fn5bx,Uid:384fd921-b079-428f-a83c-974ac0641f71,Namespace:kube-system,Attempt:1,} returns sandbox id \"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05\"" Dec 13 14:07:56.277910 env[1493]: time="2024-12-13T14:07:56.277580586Z" level=info msg="CreateContainer within sandbox \"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:07:56.287612 systemd[1]: Started cri-containerd-e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff.scope. Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.302000 audit: BPF prog-id=176 op=LOAD Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4460 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393131323532323262356533623836646266393235636636366634 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4460 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393131323532323262356533623836646266393235636636366634 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit: BPF prog-id=177 op=LOAD Dec 13 14:07:56.303000 audit[4475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4460 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393131323532323262356533623836646266393235636636366634 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit: BPF prog-id=178 op=LOAD Dec 13 14:07:56.303000 audit[4475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4460 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393131323532323262356533623836646266393235636636366634 Dec 13 14:07:56.303000 audit: BPF prog-id=178 op=UNLOAD Dec 13 14:07:56.303000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { perfmon } for pid=4475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit[4475]: AVC avc: denied { bpf } for pid=4475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.303000 audit: BPF prog-id=179 op=LOAD Dec 13 14:07:56.303000 audit[4475]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4460 pid=4475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.303000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538393131323532323262356533623836646266393235636636366634 Dec 13 14:07:56.322973 env[1493]: time="2024-12-13T14:07:56.322926582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-bn7rv,Uid:4982cd66-aea8-4e3a-8a68-3fc8def21791,Namespace:calico-system,Attempt:1,} returns sandbox id \"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff\"" Dec 13 14:07:56.367004 env[1493]: time="2024-12-13T14:07:56.366964335Z" level=info msg="StartContainer for \"b033c3c082f4a3388feb6436ba481527829f21f3d60bdd85b090f2d8d58102c0\" returns successfully" Dec 13 14:07:56.401960 env[1493]: time="2024-12-13T14:07:56.401857233Z" level=info msg="CreateContainer within sandbox \"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0b587cbaf3268bc8973a6eaa0623927f07e7234621c78acdc8dfb2d0b83bd869\"" Dec 13 14:07:56.405454 env[1493]: time="2024-12-13T14:07:56.405342839Z" level=info msg="StartContainer for \"0b587cbaf3268bc8973a6eaa0623927f07e7234621c78acdc8dfb2d0b83bd869\"" Dec 13 14:07:56.435198 kubelet[2604]: I1213 14:07:56.435033 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-8dlrg" podStartSLOduration=38.435015129 podStartE2EDuration="38.435015129s" podCreationTimestamp="2024-12-13 14:07:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:56.432737005 +0000 UTC m=+54.316171091" watchObservedRunningTime="2024-12-13 14:07:56.435015129 +0000 UTC m=+54.318449255" Dec 13 14:07:56.476950 systemd[1]: run-containerd-runc-k8s.io-0b587cbaf3268bc8973a6eaa0623927f07e7234621c78acdc8dfb2d0b83bd869-runc.ttY7Jz.mount: Deactivated successfully. Dec 13 14:07:56.481000 audit[4563]: NETFILTER_CFG table=filter:109 family=2 entries=16 op=nft_register_rule pid=4563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.481000 audit[4563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe4895290 a2=0 a3=1 items=0 ppid=2782 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.485606 systemd[1]: Started cri-containerd-0b587cbaf3268bc8973a6eaa0623927f07e7234621c78acdc8dfb2d0b83bd869.scope. Dec 13 14:07:56.495000 audit[4563]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4563 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.495000 audit[4563]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffe4895290 a2=0 a3=1 items=0 ppid=2782 pid=4563 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.503000 audit: BPF prog-id=180 op=LOAD Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=4391 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353837636261663332363862633839373361366561613036323339 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=4391 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353837636261663332363862633839373361366561613036323339 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.504000 audit: BPF prog-id=181 op=LOAD Dec 13 14:07:56.504000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=4391 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.504000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353837636261663332363862633839373361366561613036323339 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.505000 audit: BPF prog-id=182 op=LOAD Dec 13 14:07:56.505000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=4391 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353837636261663332363862633839373361366561613036323339 Dec 13 14:07:56.505000 audit: BPF prog-id=182 op=UNLOAD Dec 13 14:07:56.506000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { perfmon } for pid=4551 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit[4551]: AVC avc: denied { bpf } for pid=4551 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.506000 audit: BPF prog-id=183 op=LOAD Dec 13 14:07:56.506000 audit[4551]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=4391 pid=4551 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3062353837636261663332363862633839373361366561613036323339 Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.388 [INFO][4525] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.388 [INFO][4525] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" iface="eth0" netns="/var/run/netns/cni-7c204726-7087-2e15-b277-97f92b3aaa93" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.388 [INFO][4525] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" iface="eth0" netns="/var/run/netns/cni-7c204726-7087-2e15-b277-97f92b3aaa93" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.388 [INFO][4525] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" iface="eth0" netns="/var/run/netns/cni-7c204726-7087-2e15-b277-97f92b3aaa93" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.389 [INFO][4525] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.389 [INFO][4525] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.478 [INFO][4540] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.478 [INFO][4540] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.478 [INFO][4540] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.502 [WARNING][4540] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.502 [INFO][4540] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.509 [INFO][4540] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:56.512403 env[1493]: 2024-12-13 14:07:56.510 [INFO][4525] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:07:56.515038 systemd[1]: run-netns-cni\x2d7c204726\x2d7087\x2d2e15\x2db277\x2d97f92b3aaa93.mount: Deactivated successfully. Dec 13 14:07:56.515934 env[1493]: time="2024-12-13T14:07:56.515896304Z" level=info msg="TearDown network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" successfully" Dec 13 14:07:56.516030 env[1493]: time="2024-12-13T14:07:56.516013744Z" level=info msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" returns successfully" Dec 13 14:07:56.516734 env[1493]: time="2024-12-13T14:07:56.516706185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-xj49q,Uid:c4170cdc-c9ea-46ee-8122-2b883dffdfa9,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:07:56.527000 audit[4577]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=4577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.527000 audit[4577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff8d95c90 a2=0 a3=1 items=0 ppid=2782 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.533262 env[1493]: time="2024-12-13T14:07:56.533205692Z" level=info msg="StartContainer for \"0b587cbaf3268bc8973a6eaa0623927f07e7234621c78acdc8dfb2d0b83bd869\" returns successfully" Dec 13 14:07:56.535000 audit[4577]: NETFILTER_CFG table=nat:112 family=2 entries=35 op=nft_register_chain pid=4577 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.535000 audit[4577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=fffff8d95c90 a2=0 a3=1 items=0 ppid=2782 pid=4577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.713709 systemd-networkd[1631]: cali5f837e08161: Link UP Dec 13 14:07:56.731480 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:07:56.731606 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f837e08161: link becomes ready Dec 13 14:07:56.737351 systemd-networkd[1631]: cali5f837e08161: Gained carrier Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.629 [INFO][4583] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0 calico-apiserver-cbb967c57- calico-apiserver c4170cdc-c9ea-46ee-8122-2b883dffdfa9 826 0 2024-12-13 14:07:26 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:cbb967c57 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-1df240c4f3 calico-apiserver-cbb967c57-xj49q eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5f837e08161 [] []}} ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.629 [INFO][4583] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.659 [INFO][4598] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" HandleID="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.671 [INFO][4598] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" HandleID="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003029e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-1df240c4f3", "pod":"calico-apiserver-cbb967c57-xj49q", "timestamp":"2024-12-13 14:07:56.659696503 +0000 UTC"}, Hostname:"ci-3510.3.6-a-1df240c4f3", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.671 [INFO][4598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.671 [INFO][4598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.671 [INFO][4598] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-1df240c4f3' Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.672 [INFO][4598] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.680 [INFO][4598] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.686 [INFO][4598] ipam/ipam.go 489: Trying affinity for 192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.688 [INFO][4598] ipam/ipam.go 155: Attempting to load block cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.692 [INFO][4598] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.83.0/26 host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.692 [INFO][4598] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.83.0/26 handle="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.696 [INFO][4598] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.700 [INFO][4598] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.83.0/26 handle="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.709 [INFO][4598] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.83.6/26] block=192.168.83.0/26 handle="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.709 [INFO][4598] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.83.6/26] handle="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" host="ci-3510.3.6-a-1df240c4f3" Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.709 [INFO][4598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:07:56.753995 env[1493]: 2024-12-13 14:07:56.709 [INFO][4598] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.83.6/26] IPv6=[] ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" HandleID="k8s-pod-network.7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.711 [INFO][4583] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4170cdc-c9ea-46ee-8122-2b883dffdfa9", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"", Pod:"calico-apiserver-cbb967c57-xj49q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f837e08161", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.711 [INFO][4583] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.83.6/32] ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.711 [INFO][4583] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5f837e08161 ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.738 [INFO][4583] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.738 [INFO][4583] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4170cdc-c9ea-46ee-8122-2b883dffdfa9", ResourceVersion:"826", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c", Pod:"calico-apiserver-cbb967c57-xj49q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f837e08161", MAC:"3e:5c:8a:47:c8:e4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:07:56.754721 env[1493]: 2024-12-13 14:07:56.752 [INFO][4583] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c" Namespace="calico-apiserver" Pod="calico-apiserver-cbb967c57-xj49q" WorkloadEndpoint="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:07:56.777018 env[1493]: time="2024-12-13T14:07:56.776855659Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:56.777018 env[1493]: time="2024-12-13T14:07:56.776893419Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:56.777018 env[1493]: time="2024-12-13T14:07:56.776903179Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:56.777212 env[1493]: time="2024-12-13T14:07:56.777069139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c pid=4626 runtime=io.containerd.runc.v2 Dec 13 14:07:56.784000 audit[4638]: NETFILTER_CFG table=filter:113 family=2 entries=56 op=nft_register_chain pid=4638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:07:56.784000 audit[4638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27932 a0=3 a1=ffffcf3b4110 a2=0 a3=ffffa30fffa8 items=0 ppid=3776 pid=4638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.784000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:07:56.790891 systemd[1]: Started cri-containerd-7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c.scope. Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.808000 audit: BPF prog-id=184 op=LOAD Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4626 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393162656430323862373838376235353732306163636663323066 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4626 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393162656430323862373838376235353732306163636663323066 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.809000 audit: BPF prog-id=185 op=LOAD Dec 13 14:07:56.809000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4626 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393162656430323862373838376235353732306163636663323066 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.810000 audit: BPF prog-id=186 op=LOAD Dec 13 14:07:56.810000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4626 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.810000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393162656430323862373838376235353732306163636663323066 Dec 13 14:07:56.810000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:07:56.811000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { perfmon } for pid=4637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit[4637]: AVC avc: denied { bpf } for pid=4637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:56.811000 audit: BPF prog-id=187 op=LOAD Dec 13 14:07:56.811000 audit[4637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4626 pid=4637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732393162656430323862373838376235353732306163636663323066 Dec 13 14:07:56.837063 env[1493]: time="2024-12-13T14:07:56.837016719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-cbb967c57-xj49q,Uid:c4170cdc-c9ea-46ee-8122-2b883dffdfa9,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c\"" Dec 13 14:07:57.254564 systemd-networkd[1631]: cali767a9e90a0d: Gained IPv6LL Dec 13 14:07:57.254842 systemd-networkd[1631]: calicbe2880d983: Gained IPv6LL Dec 13 14:07:57.433255 kubelet[2604]: I1213 14:07:57.433204 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-fn5bx" podStartSLOduration=39.433187506 podStartE2EDuration="39.433187506s" podCreationTimestamp="2024-12-13 14:07:18 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:57.432063224 +0000 UTC m=+55.315497350" watchObservedRunningTime="2024-12-13 14:07:57.433187506 +0000 UTC m=+55.316621632" Dec 13 14:07:57.450000 audit[4661]: NETFILTER_CFG table=filter:114 family=2 entries=10 op=nft_register_rule pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:57.450000 audit[4661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffe1d03f90 a2=0 a3=1 items=0 ppid=2782 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.450000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:57.457000 audit[4661]: NETFILTER_CFG table=nat:115 family=2 entries=44 op=nft_register_rule pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:57.457000 audit[4661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffe1d03f90 a2=0 a3=1 items=0 ppid=2782 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:57.457000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:57.510458 systemd-networkd[1631]: calife023dbcdd6: Gained IPv6LL Dec 13 14:07:57.574520 systemd-networkd[1631]: cali544322d893b: Gained IPv6LL Dec 13 14:07:57.574789 systemd-networkd[1631]: caliba050b2ff06: Gained IPv6LL Dec 13 14:07:57.830445 systemd-networkd[1631]: cali5f837e08161: Gained IPv6LL Dec 13 14:07:58.473000 audit[4663]: NETFILTER_CFG table=filter:116 family=2 entries=10 op=nft_register_rule pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:58.473000 audit[4663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffff13bf00 a2=0 a3=1 items=0 ppid=2782 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:58.481000 audit[4663]: NETFILTER_CFG table=nat:117 family=2 entries=56 op=nft_register_chain pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:58.481000 audit[4663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffff13bf00 a2=0 a3=1 items=0 ppid=2782 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:58.737453 env[1493]: time="2024-12-13T14:07:58.737352246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.746103 env[1493]: time="2024-12-13T14:07:58.746071620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.750030 env[1493]: time="2024-12-13T14:07:58.750001866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.755361 env[1493]: time="2024-12-13T14:07:58.755322355Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.756000 env[1493]: time="2024-12-13T14:07:58.755968876Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:07:58.760113 env[1493]: time="2024-12-13T14:07:58.759719602Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:07:58.762874 env[1493]: time="2024-12-13T14:07:58.762844687Z" level=info msg="CreateContainer within sandbox \"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:07:58.796172 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount166567040.mount: Deactivated successfully. Dec 13 14:07:58.807628 env[1493]: time="2024-12-13T14:07:58.807589120Z" level=info msg="CreateContainer within sandbox \"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"4fd49bd241f1a229ce4498ca9c5ea376f9b938755da23724ab831db2fd1e35ba\"" Dec 13 14:07:58.809472 env[1493]: time="2024-12-13T14:07:58.809446763Z" level=info msg="StartContainer for \"4fd49bd241f1a229ce4498ca9c5ea376f9b938755da23724ab831db2fd1e35ba\"" Dec 13 14:07:58.827974 systemd[1]: Started cri-containerd-4fd49bd241f1a229ce4498ca9c5ea376f9b938755da23724ab831db2fd1e35ba.scope. Dec 13 14:07:58.837948 systemd[1]: run-containerd-runc-k8s.io-4fd49bd241f1a229ce4498ca9c5ea376f9b938755da23724ab831db2fd1e35ba-runc.c2lfyo.mount: Deactivated successfully. Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.847000 audit: BPF prog-id=188 op=LOAD Dec 13 14:07:58.848000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.848000 audit[4672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4294 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643439626432343166316132323963653434393863613963356561 Dec 13 14:07:58.848000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.848000 audit[4672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4294 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643439626432343166316132323963653434393863613963356561 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit: BPF prog-id=189 op=LOAD Dec 13 14:07:58.849000 audit[4672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4294 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643439626432343166316132323963653434393863613963356561 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.849000 audit: BPF prog-id=190 op=LOAD Dec 13 14:07:58.849000 audit[4672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4294 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643439626432343166316132323963653434393863613963356561 Dec 13 14:07:58.850000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:07:58.850000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { perfmon } for pid=4672 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit[4672]: AVC avc: denied { bpf } for pid=4672 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.850000 audit: BPF prog-id=191 op=LOAD Dec 13 14:07:58.850000 audit[4672]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4294 pid=4672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.850000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3466643439626432343166316132323963653434393863613963356561 Dec 13 14:07:58.875261 env[1493]: time="2024-12-13T14:07:58.875204151Z" level=info msg="StartContainer for \"4fd49bd241f1a229ce4498ca9c5ea376f9b938755da23724ab831db2fd1e35ba\" returns successfully" Dec 13 14:07:59.127000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.127000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400f546580 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.127000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.127000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400e206360 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.127000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.127000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=400e2063f0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.127000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.142000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.142000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e672270 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.324000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.324000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400e672570 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.331000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.331000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=400f147be0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:07:59.331000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:59.447101 kubelet[2604]: I1213 14:07:59.447048 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-cbb967c57-sh2hp" podStartSLOduration=30.828394834 podStartE2EDuration="33.447034358s" podCreationTimestamp="2024-12-13 14:07:26 +0000 UTC" firstStartedPulling="2024-12-13 14:07:56.140655318 +0000 UTC m=+54.024089404" lastFinishedPulling="2024-12-13 14:07:58.759294762 +0000 UTC m=+56.642728928" observedRunningTime="2024-12-13 14:07:59.445912716 +0000 UTC m=+57.329346842" watchObservedRunningTime="2024-12-13 14:07:59.447034358 +0000 UTC m=+57.330468484" Dec 13 14:07:59.464000 audit[4702]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:59.464000 audit[4702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff341b4d0 a2=0 a3=1 items=0 ppid=2782 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:59.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:59.469000 audit[4702]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4702 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:59.469000 audit[4702]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff341b4d0 a2=0 a3=1 items=0 ppid=2782 pid=4702 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:59.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:59.613000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.613000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026e6800 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:59.613000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:59.613000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:59.613000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40018df6b0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:07:59.613000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:00.272000 audit[4683]: AVC avc: denied { watch } for pid=4683 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.3115903554/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c725,c781 tclass=file permissive=0 Dec 13 14:08:00.272000 audit[4683]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000451060 a2=fc6 a3=0 items=0 ppid=4294 pid=4683 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 key=(null) Dec 13 14:08:00.272000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:08:00.479000 audit[4711]: NETFILTER_CFG table=filter:120 family=2 entries=9 op=nft_register_rule pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:00.479000 audit[4711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe3ef9610 a2=0 a3=1 items=0 ppid=2782 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:00.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:00.489000 audit[4711]: NETFILTER_CFG table=nat:121 family=2 entries=27 op=nft_register_chain pid=4711 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:00.489000 audit[4711]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffe3ef9610 a2=0 a3=1 items=0 ppid=2782 pid=4711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:00.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:01.534642 env[1493]: time="2024-12-13T14:08:01.534597703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:01.543144 env[1493]: time="2024-12-13T14:08:01.543096276Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:01.549660 env[1493]: time="2024-12-13T14:08:01.549624407Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:01.555434 env[1493]: time="2024-12-13T14:08:01.555397656Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:01.556146 env[1493]: time="2024-12-13T14:08:01.556118857Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:08:01.557495 env[1493]: time="2024-12-13T14:08:01.557468459Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:08:01.572537 env[1493]: time="2024-12-13T14:08:01.572488003Z" level=info msg="CreateContainer within sandbox \"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:08:01.608804 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1562975533.mount: Deactivated successfully. Dec 13 14:08:01.625754 env[1493]: time="2024-12-13T14:08:01.625702127Z" level=info msg="CreateContainer within sandbox \"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0\"" Dec 13 14:08:01.626470 env[1493]: time="2024-12-13T14:08:01.626441609Z" level=info msg="StartContainer for \"5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0\"" Dec 13 14:08:01.650248 systemd[1]: Started cri-containerd-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0.scope. Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.696236 kernel: kauditd_printk_skb: 664 callbacks suppressed Dec 13 14:08:01.696312 kernel: audit: type=1400 audit(1734098881.671:1304): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.716794 kernel: audit: type=1400 audit(1734098881.671:1305): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.735479 kernel: audit: type=1400 audit(1734098881.671:1306): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.754728 kernel: audit: type=1400 audit(1734098881.671:1307): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.754867 kernel: audit: type=1400 audit(1734098881.671:1308): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.794494 kernel: audit: type=1400 audit(1734098881.671:1309): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.814657 kernel: audit: type=1400 audit(1734098881.671:1310): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.834966 kernel: audit: type=1400 audit(1734098881.671:1311): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.853022 kernel: audit: type=1400 audit(1734098881.671:1312): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.872060 kernel: audit: type=1400 audit(1734098881.671:1313): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.872842 env[1493]: time="2024-12-13T14:08:01.872783439Z" level=info msg="StartContainer for \"5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0\" returns successfully" Dec 13 14:08:01.671000 audit: BPF prog-id=192 op=LOAD Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4308 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:01.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562626333656634373864626665363762356263363366623331306536 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4308 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:01.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562626333656634373864626665363762356263363366623331306536 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.671000 audit: BPF prog-id=193 op=LOAD Dec 13 14:08:01.671000 audit[4721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4308 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:01.671000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562626333656634373864626665363762356263363366623331306536 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.677000 audit: BPF prog-id=194 op=LOAD Dec 13 14:08:01.677000 audit[4721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4308 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:01.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562626333656634373864626665363762356263363366623331306536 Dec 13 14:08:01.694000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:08:01.694000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { perfmon } for pid=4721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit[4721]: AVC avc: denied { bpf } for pid=4721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:01.694000 audit: BPF prog-id=195 op=LOAD Dec 13 14:08:01.694000 audit[4721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4308 pid=4721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:01.694000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562626333656634373864626665363762356263363366623331306536 Dec 13 14:08:02.242531 env[1493]: time="2024-12-13T14:08:02.242476703Z" level=info msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.281 [WARNING][4764] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"2baf98ac-395c-4d73-805c-2096fee6c424", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993", Pod:"calico-apiserver-cbb967c57-sh2hp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali767a9e90a0d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.281 [INFO][4764] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.281 [INFO][4764] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" iface="eth0" netns="" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.281 [INFO][4764] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.281 [INFO][4764] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.312 [INFO][4772] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.313 [INFO][4772] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.313 [INFO][4772] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.322 [WARNING][4772] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.322 [INFO][4772] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.323 [INFO][4772] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.325636 env[1493]: 2024-12-13 14:08:02.324 [INFO][4764] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.326071 env[1493]: time="2024-12-13T14:08:02.325663993Z" level=info msg="TearDown network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" successfully" Dec 13 14:08:02.326071 env[1493]: time="2024-12-13T14:08:02.325691473Z" level=info msg="StopPodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" returns successfully" Dec 13 14:08:02.326174 env[1493]: time="2024-12-13T14:08:02.326138754Z" level=info msg="RemovePodSandbox for \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" Dec 13 14:08:02.326219 env[1493]: time="2024-12-13T14:08:02.326181994Z" level=info msg="Forcibly stopping sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\"" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.368 [WARNING][4790] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"2baf98ac-395c-4d73-805c-2096fee6c424", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"114368c72baa787e1f728869b65ba425a352b0e27ac5db0d4ea87e29ae59d993", Pod:"calico-apiserver-cbb967c57-sh2hp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali767a9e90a0d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.368 [INFO][4790] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.368 [INFO][4790] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" iface="eth0" netns="" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.368 [INFO][4790] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.368 [INFO][4790] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.387 [INFO][4796] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.387 [INFO][4796] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.387 [INFO][4796] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.399 [WARNING][4796] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.399 [INFO][4796] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" HandleID="k8s-pod-network.b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--sh2hp-eth0" Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.400 [INFO][4796] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.406438 env[1493]: 2024-12-13 14:08:02.404 [INFO][4790] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425" Dec 13 14:08:02.406871 env[1493]: time="2024-12-13T14:08:02.406464880Z" level=info msg="TearDown network for sandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" successfully" Dec 13 14:08:02.428287 env[1493]: time="2024-12-13T14:08:02.428232235Z" level=info msg="RemovePodSandbox \"b4ef10bc9c0ef6aa173569351c457ad11e2632e44c5b7c50c0d45d26437ac425\" returns successfully" Dec 13 14:08:02.428872 env[1493]: time="2024-12-13T14:08:02.428848636Z" level=info msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" Dec 13 14:08:02.455058 kubelet[2604]: I1213 14:08:02.454991 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-649bd59ff9-48tws" podStartSLOduration=30.099222958 podStartE2EDuration="35.454961837s" podCreationTimestamp="2024-12-13 14:07:27 +0000 UTC" firstStartedPulling="2024-12-13 14:07:56.20158242 +0000 UTC m=+54.085016546" lastFinishedPulling="2024-12-13 14:08:01.557321299 +0000 UTC m=+59.440755425" observedRunningTime="2024-12-13 14:08:02.454389956 +0000 UTC m=+60.337824082" watchObservedRunningTime="2024-12-13 14:08:02.454961837 +0000 UTC m=+60.338395923" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.488 [WARNING][4816] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4170cdc-c9ea-46ee-8122-2b883dffdfa9", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c", Pod:"calico-apiserver-cbb967c57-xj49q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f837e08161", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.488 [INFO][4816] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.488 [INFO][4816] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" iface="eth0" netns="" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.488 [INFO][4816] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.488 [INFO][4816] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.529 [INFO][4833] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.529 [INFO][4833] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.529 [INFO][4833] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.546 [WARNING][4833] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.546 [INFO][4833] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.556 [INFO][4833] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.558161 env[1493]: 2024-12-13 14:08:02.557 [INFO][4816] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.559186 env[1493]: time="2024-12-13T14:08:02.559149681Z" level=info msg="TearDown network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" successfully" Dec 13 14:08:02.559278 env[1493]: time="2024-12-13T14:08:02.559251001Z" level=info msg="StopPodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" returns successfully" Dec 13 14:08:02.560033 env[1493]: time="2024-12-13T14:08:02.559814002Z" level=info msg="RemovePodSandbox for \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" Dec 13 14:08:02.560033 env[1493]: time="2024-12-13T14:08:02.559884722Z" level=info msg="Forcibly stopping sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\"" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.599 [WARNING][4860] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0", GenerateName:"calico-apiserver-cbb967c57-", Namespace:"calico-apiserver", SelfLink:"", UID:"c4170cdc-c9ea-46ee-8122-2b883dffdfa9", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 26, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"cbb967c57", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c", Pod:"calico-apiserver-cbb967c57-xj49q", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.83.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f837e08161", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.599 [INFO][4860] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.599 [INFO][4860] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" iface="eth0" netns="" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.599 [INFO][4860] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.600 [INFO][4860] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.617 [INFO][4866] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.617 [INFO][4866] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.617 [INFO][4866] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.625 [WARNING][4866] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.625 [INFO][4866] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" HandleID="k8s-pod-network.80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--apiserver--cbb967c57--xj49q-eth0" Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.626 [INFO][4866] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.628770 env[1493]: 2024-12-13 14:08:02.627 [INFO][4860] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89" Dec 13 14:08:02.629221 env[1493]: time="2024-12-13T14:08:02.628807910Z" level=info msg="TearDown network for sandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" successfully" Dec 13 14:08:02.638663 env[1493]: time="2024-12-13T14:08:02.638623846Z" level=info msg="RemovePodSandbox \"80f325f7d487f0c4893553c28e41208bef5e8ec1a35ec633101a45a7afc49e89\" returns successfully" Dec 13 14:08:02.639123 env[1493]: time="2024-12-13T14:08:02.639092006Z" level=info msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.674 [WARNING][4884] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"384fd921-b079-428f-a83c-974ac0641f71", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05", Pod:"coredns-7db6d8ff4d-fn5bx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali544322d893b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.674 [INFO][4884] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.674 [INFO][4884] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" iface="eth0" netns="" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.674 [INFO][4884] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.675 [INFO][4884] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.692 [INFO][4890] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.692 [INFO][4890] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.692 [INFO][4890] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.701 [WARNING][4890] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.701 [INFO][4890] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.702 [INFO][4890] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.704424 env[1493]: 2024-12-13 14:08:02.703 [INFO][4884] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.704911 env[1493]: time="2024-12-13T14:08:02.704458309Z" level=info msg="TearDown network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" successfully" Dec 13 14:08:02.704911 env[1493]: time="2024-12-13T14:08:02.704487309Z" level=info msg="StopPodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" returns successfully" Dec 13 14:08:02.705140 env[1493]: time="2024-12-13T14:08:02.705118390Z" level=info msg="RemovePodSandbox for \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" Dec 13 14:08:02.705305 env[1493]: time="2024-12-13T14:08:02.705245390Z" level=info msg="Forcibly stopping sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\"" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.744 [WARNING][4909] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"384fd921-b079-428f-a83c-974ac0641f71", ResourceVersion:"847", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4998271a9307310efb232df7453acbb4c03e9421db7efe5eb1efa2b6696ddc05", Pod:"coredns-7db6d8ff4d-fn5bx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali544322d893b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.744 [INFO][4909] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.744 [INFO][4909] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" iface="eth0" netns="" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.744 [INFO][4909] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.744 [INFO][4909] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.761 [INFO][4916] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.761 [INFO][4916] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.761 [INFO][4916] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.774 [WARNING][4916] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.774 [INFO][4916] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" HandleID="k8s-pod-network.a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--fn5bx-eth0" Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.775 [INFO][4916] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.777919 env[1493]: 2024-12-13 14:08:02.776 [INFO][4909] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034" Dec 13 14:08:02.778453 env[1493]: time="2024-12-13T14:08:02.778421305Z" level=info msg="TearDown network for sandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" successfully" Dec 13 14:08:02.785023 env[1493]: time="2024-12-13T14:08:02.784982396Z" level=info msg="RemovePodSandbox \"a9ccf9865686a2c4f274465019b696318fd85f83d3229915a706bd29cd6bc034\" returns successfully" Dec 13 14:08:02.785745 env[1493]: time="2024-12-13T14:08:02.785721077Z" level=info msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.819 [WARNING][4935] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ecad80b3-7c57-49a7-8fb0-b8ee573370c1", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49", Pod:"coredns-7db6d8ff4d-8dlrg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbe2880d983", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.820 [INFO][4935] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.820 [INFO][4935] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" iface="eth0" netns="" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.820 [INFO][4935] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.820 [INFO][4935] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.839 [INFO][4941] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.839 [INFO][4941] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.839 [INFO][4941] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.847 [WARNING][4941] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.847 [INFO][4941] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.849 [INFO][4941] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.851581 env[1493]: 2024-12-13 14:08:02.850 [INFO][4935] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.853010 env[1493]: time="2024-12-13T14:08:02.852977943Z" level=info msg="TearDown network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" successfully" Dec 13 14:08:02.853084 env[1493]: time="2024-12-13T14:08:02.853069503Z" level=info msg="StopPodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" returns successfully" Dec 13 14:08:02.853691 env[1493]: time="2024-12-13T14:08:02.853635104Z" level=info msg="RemovePodSandbox for \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" Dec 13 14:08:02.853761 env[1493]: time="2024-12-13T14:08:02.853698144Z" level=info msg="Forcibly stopping sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\"" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.895 [WARNING][4959] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"ecad80b3-7c57-49a7-8fb0-b8ee573370c1", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"4edf01ec5097c2fb18eee95d951e26bfddf79a9d5861435271c741340086ff49", Pod:"coredns-7db6d8ff4d-8dlrg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.83.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calicbe2880d983", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.895 [INFO][4959] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.895 [INFO][4959] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" iface="eth0" netns="" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.895 [INFO][4959] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.895 [INFO][4959] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.912 [INFO][4965] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.912 [INFO][4965] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.912 [INFO][4965] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.922 [WARNING][4965] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.922 [INFO][4965] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" HandleID="k8s-pod-network.fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Workload="ci--3510.3.6--a--1df240c4f3-k8s-coredns--7db6d8ff4d--8dlrg-eth0" Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.924 [INFO][4965] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:02.926154 env[1493]: 2024-12-13 14:08:02.925 [INFO][4959] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c" Dec 13 14:08:02.926757 env[1493]: time="2024-12-13T14:08:02.926725579Z" level=info msg="TearDown network for sandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" successfully" Dec 13 14:08:02.936250 env[1493]: time="2024-12-13T14:08:02.936212793Z" level=info msg="RemovePodSandbox \"fe0659a6d1edb2c5296869eff66ca3d821b8059ac0b359886b9ed1a4c659786c\" returns successfully" Dec 13 14:08:02.936805 env[1493]: time="2024-12-13T14:08:02.936782954Z" level=info msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.974 [WARNING][4983] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0", GenerateName:"calico-kube-controllers-649bd59ff9-", Namespace:"calico-system", SelfLink:"", UID:"608f4f8e-e27b-4f22-b60f-8faf588975a4", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"649bd59ff9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8", Pod:"calico-kube-controllers-649bd59ff9-48tws", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba050b2ff06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.974 [INFO][4983] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.974 [INFO][4983] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" iface="eth0" netns="" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.974 [INFO][4983] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.974 [INFO][4983] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.993 [INFO][4989] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.993 [INFO][4989] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:02.993 [INFO][4989] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:03.002 [WARNING][4989] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:03.002 [INFO][4989] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:03.003 [INFO][4989] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:03.005954 env[1493]: 2024-12-13 14:08:03.004 [INFO][4983] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.006518 env[1493]: time="2024-12-13T14:08:03.006481664Z" level=info msg="TearDown network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" successfully" Dec 13 14:08:03.006595 env[1493]: time="2024-12-13T14:08:03.006579344Z" level=info msg="StopPodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" returns successfully" Dec 13 14:08:03.007145 env[1493]: time="2024-12-13T14:08:03.007118905Z" level=info msg="RemovePodSandbox for \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" Dec 13 14:08:03.007366 env[1493]: time="2024-12-13T14:08:03.007324385Z" level=info msg="Forcibly stopping sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\"" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.041 [WARNING][5007] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0", GenerateName:"calico-kube-controllers-649bd59ff9-", Namespace:"calico-system", SelfLink:"", UID:"608f4f8e-e27b-4f22-b60f-8faf588975a4", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"649bd59ff9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"cf77005579936dee344921767e0d113f612d117b5cdcf3207174c7a5b07205c8", Pod:"calico-kube-controllers-649bd59ff9-48tws", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.83.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliba050b2ff06", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.041 [INFO][5007] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.041 [INFO][5007] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" iface="eth0" netns="" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.041 [INFO][5007] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.041 [INFO][5007] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.059 [INFO][5013] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.060 [INFO][5013] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.060 [INFO][5013] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.068 [WARNING][5013] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.068 [INFO][5013] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" HandleID="k8s-pod-network.66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Workload="ci--3510.3.6--a--1df240c4f3-k8s-calico--kube--controllers--649bd59ff9--48tws-eth0" Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.071 [INFO][5013] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:03.074313 env[1493]: 2024-12-13 14:08:03.073 [INFO][5007] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b" Dec 13 14:08:03.074752 env[1493]: time="2024-12-13T14:08:03.074346650Z" level=info msg="TearDown network for sandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" successfully" Dec 13 14:08:03.083047 env[1493]: time="2024-12-13T14:08:03.083004743Z" level=info msg="RemovePodSandbox \"66aef2cae1549ce71a422c6e83c913a0b2e3c4c0e377ba75acc8ea9d37be4b3b\" returns successfully" Dec 13 14:08:03.083664 env[1493]: time="2024-12-13T14:08:03.083641344Z" level=info msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.117 [WARNING][5031] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4982cd66-aea8-4e3a-8a68-3fc8def21791", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff", Pod:"csi-node-driver-bn7rv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife023dbcdd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.117 [INFO][5031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.117 [INFO][5031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" iface="eth0" netns="" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.117 [INFO][5031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.117 [INFO][5031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.136 [INFO][5037] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.136 [INFO][5037] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.136 [INFO][5037] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.144 [WARNING][5037] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.144 [INFO][5037] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.145 [INFO][5037] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:03.148024 env[1493]: 2024-12-13 14:08:03.147 [INFO][5031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.149549 env[1493]: time="2024-12-13T14:08:03.149517567Z" level=info msg="TearDown network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" successfully" Dec 13 14:08:03.149618 env[1493]: time="2024-12-13T14:08:03.149603687Z" level=info msg="StopPodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" returns successfully" Dec 13 14:08:03.150129 env[1493]: time="2024-12-13T14:08:03.150107568Z" level=info msg="RemovePodSandbox for \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" Dec 13 14:08:03.150406 env[1493]: time="2024-12-13T14:08:03.150364448Z" level=info msg="Forcibly stopping sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\"" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.187 [WARNING][5056] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"4982cd66-aea8-4e3a-8a68-3fc8def21791", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"65bf684474", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-1df240c4f3", ContainerID:"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff", Pod:"csi-node-driver-bn7rv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.83.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calife023dbcdd6", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.187 [INFO][5056] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.187 [INFO][5056] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" iface="eth0" netns="" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.187 [INFO][5056] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.187 [INFO][5056] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.205 [INFO][5062] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.205 [INFO][5062] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.206 [INFO][5062] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.217 [WARNING][5062] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.217 [INFO][5062] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" HandleID="k8s-pod-network.09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Workload="ci--3510.3.6--a--1df240c4f3-k8s-csi--node--driver--bn7rv-eth0" Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.218 [INFO][5062] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:03.220696 env[1493]: 2024-12-13 14:08:03.219 [INFO][5056] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88" Dec 13 14:08:03.221414 env[1493]: time="2024-12-13T14:08:03.221318519Z" level=info msg="TearDown network for sandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" successfully" Dec 13 14:08:03.232465 env[1493]: time="2024-12-13T14:08:03.232427016Z" level=info msg="RemovePodSandbox \"09126c251e6081bf0b8457d5702b0ab04cac2d0651f23f009d130555fa19aa88\" returns successfully" Dec 13 14:08:03.764934 systemd[1]: run-containerd-runc-k8s.io-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12-runc.Fy7tKm.mount: Deactivated successfully. Dec 13 14:08:04.217344 env[1493]: time="2024-12-13T14:08:04.217291668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.351884 env[1493]: time="2024-12-13T14:08:04.351834675Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.403715 env[1493]: time="2024-12-13T14:08:04.403657555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.409087 env[1493]: time="2024-12-13T14:08:04.409049524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.409833 env[1493]: time="2024-12-13T14:08:04.409803925Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:08:04.412209 env[1493]: time="2024-12-13T14:08:04.412170369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:08:04.413416 env[1493]: time="2024-12-13T14:08:04.413390770Z" level=info msg="CreateContainer within sandbox \"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:08:04.448729 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3685326470.mount: Deactivated successfully. Dec 13 14:08:04.459440 env[1493]: time="2024-12-13T14:08:04.459397481Z" level=info msg="CreateContainer within sandbox \"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"384e62e381c280a2e664663f13277fd8b72bb36ced66f26a60beb0ebeb4b6f99\"" Dec 13 14:08:04.460314 env[1493]: time="2024-12-13T14:08:04.460262203Z" level=info msg="StartContainer for \"384e62e381c280a2e664663f13277fd8b72bb36ced66f26a60beb0ebeb4b6f99\"" Dec 13 14:08:04.476364 systemd[1]: Started cri-containerd-384e62e381c280a2e664663f13277fd8b72bb36ced66f26a60beb0ebeb4b6f99.scope. Dec 13 14:08:04.494000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.494000 audit[5099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4460 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338346536326533383163323830613265363634363633663133323737 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit: BPF prog-id=196 op=LOAD Dec 13 14:08:04.495000 audit[5099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4460 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338346536326533383163323830613265363634363633663133323737 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.495000 audit: BPF prog-id=197 op=LOAD Dec 13 14:08:04.495000 audit[5099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4460 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338346536326533383163323830613265363634363633663133323737 Dec 13 14:08:04.496000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:08:04.496000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { perfmon } for pid=5099 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit[5099]: AVC avc: denied { bpf } for pid=5099 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.496000 audit: BPF prog-id=198 op=LOAD Dec 13 14:08:04.496000 audit[5099]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4460 pid=5099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338346536326533383163323830613265363634363633663133323737 Dec 13 14:08:04.517136 env[1493]: time="2024-12-13T14:08:04.517094131Z" level=info msg="StartContainer for \"384e62e381c280a2e664663f13277fd8b72bb36ced66f26a60beb0ebeb4b6f99\" returns successfully" Dec 13 14:08:04.746292 env[1493]: time="2024-12-13T14:08:04.746166044Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.754889 env[1493]: time="2024-12-13T14:08:04.754845298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.760953 env[1493]: time="2024-12-13T14:08:04.760924147Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.767048 env[1493]: time="2024-12-13T14:08:04.767007197Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.767688 env[1493]: time="2024-12-13T14:08:04.767656758Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:08:04.769749 env[1493]: time="2024-12-13T14:08:04.769721561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:08:04.770806 env[1493]: time="2024-12-13T14:08:04.770778802Z" level=info msg="CreateContainer within sandbox \"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:08:04.809328 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4197839059.mount: Deactivated successfully. Dec 13 14:08:04.825946 env[1493]: time="2024-12-13T14:08:04.825894608Z" level=info msg="CreateContainer within sandbox \"7291bed028b7887b55720accfc20f11cc2e87e0423d3f9065535c98860661b6c\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"26e1ccf3c5f05a710ab8ef9b739c0b2acbd0b4aee0f436f94caabdb74ea2e6e3\"" Dec 13 14:08:04.826600 env[1493]: time="2024-12-13T14:08:04.826574369Z" level=info msg="StartContainer for \"26e1ccf3c5f05a710ab8ef9b739c0b2acbd0b4aee0f436f94caabdb74ea2e6e3\"" Dec 13 14:08:04.845103 systemd[1]: Started cri-containerd-26e1ccf3c5f05a710ab8ef9b739c0b2acbd0b4aee0f436f94caabdb74ea2e6e3.scope. Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.865000 audit: BPF prog-id=199 op=LOAD Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4626 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653163636633633566303561373130616238656639623733396330 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4626 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653163636633633566303561373130616238656639623733396330 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit: BPF prog-id=200 op=LOAD Dec 13 14:08:04.866000 audit[5133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4626 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653163636633633566303561373130616238656639623733396330 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit: BPF prog-id=201 op=LOAD Dec 13 14:08:04.866000 audit[5133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4626 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653163636633633566303561373130616238656639623733396330 Dec 13 14:08:04.866000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:08:04.866000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { perfmon } for pid=5133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit[5133]: AVC avc: denied { bpf } for pid=5133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.866000 audit: BPF prog-id=202 op=LOAD Dec 13 14:08:04.866000 audit[5133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4626 pid=5133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.866000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236653163636633633566303561373130616238656639623733396330 Dec 13 14:08:04.896484 env[1493]: time="2024-12-13T14:08:04.896420756Z" level=info msg="StartContainer for \"26e1ccf3c5f05a710ab8ef9b739c0b2acbd0b4aee0f436f94caabdb74ea2e6e3\" returns successfully" Dec 13 14:08:05.475248 kubelet[2604]: I1213 14:08:05.475182 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-cbb967c57-xj49q" podStartSLOduration=31.544773846 podStartE2EDuration="39.475163964s" podCreationTimestamp="2024-12-13 14:07:26 +0000 UTC" firstStartedPulling="2024-12-13 14:07:56.838404641 +0000 UTC m=+54.721838767" lastFinishedPulling="2024-12-13 14:08:04.768794799 +0000 UTC m=+62.652228885" observedRunningTime="2024-12-13 14:08:05.474791763 +0000 UTC m=+63.358225889" watchObservedRunningTime="2024-12-13 14:08:05.475163964 +0000 UTC m=+63.358598090" Dec 13 14:08:05.500000 audit[5167]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=5167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:05.500000 audit[5167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd6990c20 a2=0 a3=1 items=0 ppid=2782 pid=5167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:05.500000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:05.504000 audit[5167]: NETFILTER_CFG table=nat:123 family=2 entries=30 op=nft_register_rule pid=5167 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:05.504000 audit[5167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=9348 a0=3 a1=ffffd6990c20 a2=0 a3=1 items=0 ppid=2782 pid=5167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:05.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:05.712000 audit[5146]: AVC avc: denied { watch } for pid=5146 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.2633475739/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c828,c1007 tclass=file permissive=0 Dec 13 14:08:05.712000 audit[5146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40010ed780 a2=fc6 a3=0 items=0 ppid=4626 pid=5146 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 key=(null) Dec 13 14:08:05.712000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:08:05.759053 systemd[1]: run-containerd-runc-k8s.io-26e1ccf3c5f05a710ab8ef9b739c0b2acbd0b4aee0f436f94caabdb74ea2e6e3-runc.rsZ9ED.mount: Deactivated successfully. Dec 13 14:08:06.363013 env[1493]: time="2024-12-13T14:08:06.362971479Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.370263 env[1493]: time="2024-12-13T14:08:06.370231090Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.375886 env[1493]: time="2024-12-13T14:08:06.375846578Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.380998 env[1493]: time="2024-12-13T14:08:06.380969746Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.381396 env[1493]: time="2024-12-13T14:08:06.381365587Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:08:06.384718 env[1493]: time="2024-12-13T14:08:06.384560312Z" level=info msg="CreateContainer within sandbox \"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:08:06.413505 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount464829110.mount: Deactivated successfully. Dec 13 14:08:06.428441 env[1493]: time="2024-12-13T14:08:06.428355098Z" level=info msg="CreateContainer within sandbox \"e891125222b5e3b86dbf925cf66f4f5262cb5a68e74d12d46688d183f7ff03ff\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3e396e7c0c7b1caefe4f25c129a470ad085ecce8d9b64afe4a42245a8cb2fdd8\"" Dec 13 14:08:06.430409 env[1493]: time="2024-12-13T14:08:06.429368740Z" level=info msg="StartContainer for \"3e396e7c0c7b1caefe4f25c129a470ad085ecce8d9b64afe4a42245a8cb2fdd8\"" Dec 13 14:08:06.458049 systemd[1]: Started cri-containerd-3e396e7c0c7b1caefe4f25c129a470ad085ecce8d9b64afe4a42245a8cb2fdd8.scope. Dec 13 14:08:06.464483 kubelet[2604]: I1213 14:08:06.463857 2604 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4460 pid=5176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333936653763306337623163616566653466323563313239613437 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit: BPF prog-id=203 op=LOAD Dec 13 14:08:06.471000 audit[5176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4460 pid=5176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333936653763306337623163616566653466323563313239613437 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit: BPF prog-id=204 op=LOAD Dec 13 14:08:06.471000 audit[5176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4460 pid=5176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333936653763306337623163616566653466323563313239613437 Dec 13 14:08:06.471000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:08:06.471000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { perfmon } for pid=5176 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit[5176]: AVC avc: denied { bpf } for pid=5176 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.471000 audit: BPF prog-id=205 op=LOAD Dec 13 14:08:06.471000 audit[5176]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4460 pid=5176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365333936653763306337623163616566653466323563313239613437 Dec 13 14:08:06.490059 env[1493]: time="2024-12-13T14:08:06.490016232Z" level=info msg="StartContainer for \"3e396e7c0c7b1caefe4f25c129a470ad085ecce8d9b64afe4a42245a8cb2fdd8\" returns successfully" Dec 13 14:08:06.758974 systemd[1]: run-containerd-runc-k8s.io-3e396e7c0c7b1caefe4f25c129a470ad085ecce8d9b64afe4a42245a8cb2fdd8-runc.8KRSrh.mount: Deactivated successfully. Dec 13 14:08:07.342495 kubelet[2604]: I1213 14:08:07.342450 2604 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:08:07.342495 kubelet[2604]: I1213 14:08:07.342495 2604 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:08:07.481989 kubelet[2604]: I1213 14:08:07.481928 2604 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-bn7rv" podStartSLOduration=30.424796849 podStartE2EDuration="40.481911652s" podCreationTimestamp="2024-12-13 14:07:27 +0000 UTC" firstStartedPulling="2024-12-13 14:07:56.325642146 +0000 UTC m=+54.209076232" lastFinishedPulling="2024-12-13 14:08:06.382756909 +0000 UTC m=+64.266191035" observedRunningTime="2024-12-13 14:08:07.481731811 +0000 UTC m=+65.365165937" watchObservedRunningTime="2024-12-13 14:08:07.481911652 +0000 UTC m=+65.365345778" Dec 13 14:08:09.795177 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.G2g9ol.mount: Deactivated successfully. Dec 13 14:08:12.924744 kubelet[2604]: I1213 14:08:12.924712 2604 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:12.966000 audit[5237]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:12.973233 kernel: kauditd_printk_skb: 199 callbacks suppressed Dec 13 14:08:12.973321 kernel: audit: type=1325 audit(1734098892.966:1355): table=filter:124 family=2 entries=8 op=nft_register_rule pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:12.966000 audit[5237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffda8ec080 a2=0 a3=1 items=0 ppid=2782 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:13.017341 kernel: audit: type=1300 audit(1734098892.966:1355): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffda8ec080 a2=0 a3=1 items=0 ppid=2782 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:12.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:13.032128 kernel: audit: type=1327 audit(1734098892.966:1355): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:13.031000 audit[5237]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:13.049259 kernel: audit: type=1325 audit(1734098893.031:1356): table=nat:125 family=2 entries=34 op=nft_register_chain pid=5237 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:13.031000 audit[5237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffda8ec080 a2=0 a3=1 items=0 ppid=2782 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:13.080211 kernel: audit: type=1300 audit(1734098893.031:1356): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=ffffda8ec080 a2=0 a3=1 items=0 ppid=2782 pid=5237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:13.031000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:13.096200 kernel: audit: type=1327 audit(1734098893.031:1356): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:16.724000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.724000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.773651 kernel: audit: type=1400 audit(1734098896.724:1357): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.773794 kernel: audit: type=1400 audit(1734098896.724:1358): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.724000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40032606e0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:16.803912 kernel: audit: type=1300 audit(1734098896.724:1357): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40032606e0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:16.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:16.829882 kernel: audit: type=1327 audit(1734098896.724:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:16.724000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40031bea40 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:16.724000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:16.735000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.735000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40031bea60 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:16.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:16.735000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:16.735000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40031bea80 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:16.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:33.770332 systemd[1]: run-containerd-runc-k8s.io-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12-runc.imqwA0.mount: Deactivated successfully. Dec 13 14:08:39.786159 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.HfkASD.mount: Deactivated successfully. Dec 13 14:08:59.128000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.134987 kernel: kauditd_printk_skb: 8 callbacks suppressed Dec 13 14:08:59.135135 kernel: audit: type=1400 audit(1734098939.128:1361): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.128000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4007904560 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.184234 kernel: audit: type=1300 audit(1734098939.128:1361): arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4007904560 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.208467 kernel: audit: type=1327 audit(1734098939.128:1361): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.208595 kernel: audit: type=1400 audit(1734098939.128:1362): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.128000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.128000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009e36810 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.258478 kernel: audit: type=1300 audit(1734098939.128:1362): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009e36810 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.283306 kernel: audit: type=1327 audit(1734098939.128:1362): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.283425 kernel: audit: type=1400 audit(1734098939.128:1363): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.128000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.128000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009e36960 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.333441 kernel: audit: type=1300 audit(1734098939.128:1363): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4009e36960 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.128000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.358897 kernel: audit: type=1327 audit(1734098939.128:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.143000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.385342 kernel: audit: type=1400 audit(1734098939.143:1364): avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.143000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009e36b10 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.325000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.325000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4009e36c00 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.332000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.332000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4007904d60 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:08:59.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:59.615000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.615000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:59.615000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001cd94d0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:59.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:59.615000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001dbad80 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:08:59.615000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:00.273000 audit[4683]: AVC avc: denied { watch } for pid=4683 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.3115903554/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c725,c781 tclass=file permissive=0 Dec 13 14:09:00.273000 audit[4683]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40018c2c60 a2=fc6 a3=0 items=0 ppid=4294 pid=4683 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 key=(null) Dec 13 14:09:00.273000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:03.766561 systemd[1]: run-containerd-runc-k8s.io-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12-runc.NFVigu.mount: Deactivated successfully. Dec 13 14:09:05.713000 audit[5146]: AVC avc: denied { watch } for pid=5146 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.2633475739/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c828,c1007 tclass=file permissive=0 Dec 13 14:09:05.720018 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 14:09:05.720215 kernel: audit: type=1400 audit(1734098945.713:1370): avc: denied { watch } for pid=5146 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.2633475739/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c828,c1007 tclass=file permissive=0 Dec 13 14:09:05.713000 audit[5146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b19f60 a2=fc6 a3=0 items=0 ppid=4626 pid=5146 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 key=(null) Dec 13 14:09:05.779093 kernel: audit: type=1300 audit(1734098945.713:1370): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000b19f60 a2=fc6 a3=0 items=0 ppid=4626 pid=5146 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 key=(null) Dec 13 14:09:05.713000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:05.804038 kernel: audit: type=1327 audit(1734098945.713:1370): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:08.118425 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.rDExRU.mount: Deactivated successfully. Dec 13 14:09:09.788176 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.EXdctQ.mount: Deactivated successfully. Dec 13 14:09:16.726000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.728000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.771965 kernel: audit: type=1400 audit(1734098956.726:1371): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.772110 kernel: audit: type=1400 audit(1734098956.728:1372): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.728000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f01240 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.802417 kernel: audit: type=1300 audit(1734098956.728:1372): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001f01240 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.827981 kernel: audit: type=1327 audit(1734098956.728:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.828137 kernel: audit: type=1300 audit(1734098956.726:1371): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012ba180 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.726000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012ba180 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.726000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.882451 kernel: audit: type=1327 audit(1734098956.726:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.736000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.904328 kernel: audit: type=1400 audit(1734098956.736:1373): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.736000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012ba200 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.932852 kernel: audit: type=1300 audit(1734098956.736:1373): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012ba200 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.932991 kernel: audit: type=1327 audit(1734098956.736:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:16.737000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.979885 kernel: audit: type=1400 audit(1734098956.737:1374): avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:16.737000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40012ba220 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:16.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:32.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.16.10:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:32.693073 systemd[1]: Started sshd@7-10.200.20.37:22-10.200.16.10:58586.service. Dec 13 14:09:32.699013 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:09:32.699133 kernel: audit: type=1130 audit(1734098972.691:1375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.16.10:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:33.144000 audit[5393]: USER_ACCT pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.146467 sshd[5393]: Accepted publickey for core from 10.200.16.10 port 58586 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:33.172000 audit[5393]: CRED_ACQ pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.174179 sshd[5393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:33.197944 kernel: audit: type=1101 audit(1734098973.144:1376): pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.198068 kernel: audit: type=1103 audit(1734098973.172:1377): pid=5393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.214004 kernel: audit: type=1006 audit(1734098973.172:1378): pid=5393 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:09:33.172000 audit[5393]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9199b30 a2=3 a3=1 items=0 ppid=1 pid=5393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:33.240244 kernel: audit: type=1300 audit(1734098973.172:1378): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc9199b30 a2=3 a3=1 items=0 ppid=1 pid=5393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:33.172000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:33.249589 kernel: audit: type=1327 audit(1734098973.172:1378): proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:33.254096 systemd-logind[1461]: New session 10 of user core. Dec 13 14:09:33.257321 systemd[1]: Started session-10.scope. Dec 13 14:09:33.260000 audit[5393]: USER_START pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.289299 kernel: audit: type=1105 audit(1734098973.260:1379): pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.288000 audit[5395]: CRED_ACQ pid=5395 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.314291 kernel: audit: type=1103 audit(1734098973.288:1380): pid=5395 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.640047 sshd[5393]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:33.639000 audit[5393]: USER_END pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.641000 audit[5393]: CRED_DISP pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.669434 systemd[1]: sshd@7-10.200.20.37:22-10.200.16.10:58586.service: Deactivated successfully. Dec 13 14:09:33.670251 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:09:33.692576 kernel: audit: type=1106 audit(1734098973.639:1381): pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.692716 kernel: audit: type=1104 audit(1734098973.641:1382): pid=5393 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:33.692956 systemd-logind[1461]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:09:33.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.37:22-10.200.16.10:58586 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:33.693923 systemd-logind[1461]: Removed session 10. Dec 13 14:09:33.767644 systemd[1]: run-containerd-runc-k8s.io-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12-runc.TreFSM.mount: Deactivated successfully. Dec 13 14:09:38.709753 systemd[1]: Started sshd@8-10.200.20.37:22-10.200.16.10:42242.service. Dec 13 14:09:38.708000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.16.10:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:38.716470 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:09:38.716564 kernel: audit: type=1130 audit(1734098978.708:1384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.16.10:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:39.135000 audit[5427]: USER_ACCT pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.136976 sshd[5427]: Accepted publickey for core from 10.200.16.10 port 42242 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:39.162345 kernel: audit: type=1101 audit(1734098979.135:1385): pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.163142 sshd[5427]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:39.161000 audit[5427]: CRED_ACQ pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.191917 systemd[1]: Started session-11.scope. Dec 13 14:09:39.193342 systemd-logind[1461]: New session 11 of user core. Dec 13 14:09:39.201224 kernel: audit: type=1103 audit(1734098979.161:1386): pid=5427 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.201352 kernel: audit: type=1006 audit(1734098979.161:1387): pid=5427 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:09:39.161000 audit[5427]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda9ec8e0 a2=3 a3=1 items=0 ppid=1 pid=5427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:39.225655 kernel: audit: type=1300 audit(1734098979.161:1387): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda9ec8e0 a2=3 a3=1 items=0 ppid=1 pid=5427 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:39.161000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:39.234003 kernel: audit: type=1327 audit(1734098979.161:1387): proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:39.234475 kernel: audit: type=1105 audit(1734098979.201:1388): pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.201000 audit[5427]: USER_START pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.203000 audit[5429]: CRED_ACQ pid=5429 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.280960 kernel: audit: type=1103 audit(1734098979.203:1389): pid=5429 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.570188 sshd[5427]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:39.570000 audit[5427]: USER_END pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.573187 systemd-logind[1461]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:09:39.574321 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:09:39.575898 systemd-logind[1461]: Removed session 11. Dec 13 14:09:39.576613 systemd[1]: sshd@8-10.200.20.37:22-10.200.16.10:42242.service: Deactivated successfully. Dec 13 14:09:39.570000 audit[5427]: CRED_DISP pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.625311 kernel: audit: type=1106 audit(1734098979.570:1390): pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.625457 kernel: audit: type=1104 audit(1734098979.570:1391): pid=5427 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:39.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.37:22-10.200.16.10:42242 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:39.788535 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.fhu3DG.mount: Deactivated successfully. Dec 13 14:09:44.641175 systemd[1]: Started sshd@9-10.200.20.37:22-10.200.16.10:42244.service. Dec 13 14:09:44.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.16.10:42244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:44.646531 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:09:44.646630 kernel: audit: type=1130 audit(1734098984.640:1393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.16.10:42244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:45.069000 audit[5458]: USER_ACCT pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.073478 sshd[5458]: Accepted publickey for core from 10.200.16.10 port 42244 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:45.077073 sshd[5458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:45.075000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.116159 kernel: audit: type=1101 audit(1734098985.069:1394): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.116334 kernel: audit: type=1103 audit(1734098985.075:1395): pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.131669 kernel: audit: type=1006 audit(1734098985.075:1396): pid=5458 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:09:45.075000 audit[5458]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde131fe0 a2=3 a3=1 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:45.136788 systemd[1]: Started session-12.scope. Dec 13 14:09:45.138092 systemd-logind[1461]: New session 12 of user core. Dec 13 14:09:45.155544 kernel: audit: type=1300 audit(1734098985.075:1396): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde131fe0 a2=3 a3=1 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:45.075000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:45.163816 kernel: audit: type=1327 audit(1734098985.075:1396): proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:45.141000 audit[5458]: USER_START pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.189175 kernel: audit: type=1105 audit(1734098985.141:1397): pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.142000 audit[5460]: CRED_ACQ pid=5460 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.211005 kernel: audit: type=1103 audit(1734098985.142:1398): pid=5460 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.482250 sshd[5458]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:45.482000 audit[5458]: USER_END pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.485035 systemd-logind[1461]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:09:45.486596 systemd[1]: sshd@9-10.200.20.37:22-10.200.16.10:42244.service: Deactivated successfully. Dec 13 14:09:45.487835 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:09:45.488968 systemd-logind[1461]: Removed session 12. Dec 13 14:09:45.482000 audit[5458]: CRED_DISP pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.531351 kernel: audit: type=1106 audit(1734098985.482:1399): pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.531481 kernel: audit: type=1104 audit(1734098985.482:1400): pid=5458 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.37:22-10.200.16.10:42244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:45.554462 systemd[1]: Started sshd@10-10.200.20.37:22-10.200.16.10:42246.service. Dec 13 14:09:45.553000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.37:22-10.200.16.10:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:45.971000 audit[5470]: USER_ACCT pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.972515 sshd[5470]: Accepted publickey for core from 10.200.16.10 port 42246 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:45.972000 audit[5470]: CRED_ACQ pid=5470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.972000 audit[5470]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0ca3900 a2=3 a3=1 items=0 ppid=1 pid=5470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:45.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:45.974079 sshd[5470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:45.978414 systemd[1]: Started session-13.scope. Dec 13 14:09:45.978893 systemd-logind[1461]: New session 13 of user core. Dec 13 14:09:45.981000 audit[5470]: USER_START pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:45.983000 audit[5472]: CRED_ACQ pid=5472 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.411973 sshd[5470]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:46.412000 audit[5470]: USER_END pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.412000 audit[5470]: CRED_DISP pid=5470 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.414993 systemd[1]: sshd@10-10.200.20.37:22-10.200.16.10:42246.service: Deactivated successfully. Dec 13 14:09:46.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.37:22-10.200.16.10:42246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:46.415788 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:09:46.416503 systemd-logind[1461]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:09:46.417149 systemd-logind[1461]: Removed session 13. Dec 13 14:09:46.485923 systemd[1]: Started sshd@11-10.200.20.37:22-10.200.16.10:42250.service. Dec 13 14:09:46.484000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.37:22-10.200.16.10:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:46.897000 audit[5479]: USER_ACCT pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.898860 sshd[5479]: Accepted publickey for core from 10.200.16.10 port 42250 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:46.898000 audit[5479]: CRED_ACQ pid=5479 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.898000 audit[5479]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1e35fa0 a2=3 a3=1 items=0 ppid=1 pid=5479 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:46.898000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:46.900461 sshd[5479]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:46.904973 systemd[1]: Started session-14.scope. Dec 13 14:09:46.905482 systemd-logind[1461]: New session 14 of user core. Dec 13 14:09:46.907000 audit[5479]: USER_START pid=5479 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:46.909000 audit[5481]: CRED_ACQ pid=5481 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:47.266759 sshd[5479]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:47.266000 audit[5479]: USER_END pid=5479 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:47.266000 audit[5479]: CRED_DISP pid=5479 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:47.269477 systemd-logind[1461]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:09:47.270069 systemd[1]: sshd@11-10.200.20.37:22-10.200.16.10:42250.service: Deactivated successfully. Dec 13 14:09:47.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.37:22-10.200.16.10:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:47.270825 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:09:47.271892 systemd-logind[1461]: Removed session 14. Dec 13 14:09:52.335472 systemd[1]: Started sshd@12-10.200.20.37:22-10.200.16.10:56352.service. Dec 13 14:09:52.359362 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:09:52.359513 kernel: audit: type=1130 audit(1734098992.334:1420): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.16.10:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:52.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.16.10:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:52.748000 audit[5497]: USER_ACCT pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.750478 sshd[5497]: Accepted publickey for core from 10.200.16.10 port 56352 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:52.753931 sshd[5497]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:52.759518 systemd[1]: Started session-15.scope. Dec 13 14:09:52.760734 systemd-logind[1461]: New session 15 of user core. Dec 13 14:09:52.752000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.796785 kernel: audit: type=1101 audit(1734098992.748:1421): pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.797004 kernel: audit: type=1103 audit(1734098992.752:1422): pid=5497 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.797054 kernel: audit: type=1006 audit(1734098992.752:1423): pid=5497 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Dec 13 14:09:52.752000 audit[5497]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe97ff3c0 a2=3 a3=1 items=0 ppid=1 pid=5497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.836807 kernel: audit: type=1300 audit(1734098992.752:1423): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe97ff3c0 a2=3 a3=1 items=0 ppid=1 pid=5497 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:52.836957 kernel: audit: type=1327 audit(1734098992.752:1423): proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:52.752000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:52.764000 audit[5497]: USER_START pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.873224 kernel: audit: type=1105 audit(1734098992.764:1424): pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.766000 audit[5499]: CRED_ACQ pid=5499 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:52.896387 kernel: audit: type=1103 audit(1734098992.766:1425): pid=5499 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:53.122540 sshd[5497]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:53.122000 audit[5497]: USER_END pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:53.126224 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:09:53.127108 systemd[1]: sshd@12-10.200.20.37:22-10.200.16.10:56352.service: Deactivated successfully. Dec 13 14:09:53.123000 audit[5497]: CRED_DISP pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:53.151910 systemd-logind[1461]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:09:53.153028 systemd-logind[1461]: Removed session 15. Dec 13 14:09:53.174690 kernel: audit: type=1106 audit(1734098993.122:1426): pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:53.174809 kernel: audit: type=1104 audit(1734098993.123:1427): pid=5497 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:53.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.37:22-10.200.16.10:56352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:58.191343 systemd[1]: Started sshd@13-10.200.20.37:22-10.200.16.10:56354.service. Dec 13 14:09:58.210104 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:09:58.210238 kernel: audit: type=1130 audit(1734098998.190:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.37:22-10.200.16.10:56354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:58.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.37:22-10.200.16.10:56354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:58.602000 audit[5509]: USER_ACCT pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.603988 sshd[5509]: Accepted publickey for core from 10.200.16.10 port 56354 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:09:58.629362 kernel: audit: type=1101 audit(1734098998.602:1430): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.629460 kernel: audit: type=1103 audit(1734098998.627:1431): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.627000 audit[5509]: CRED_ACQ pid=5509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.629789 sshd[5509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:09:58.669099 kernel: audit: type=1006 audit(1734098998.627:1432): pid=5509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:09:58.627000 audit[5509]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9610bc0 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:58.694707 kernel: audit: type=1300 audit(1734098998.627:1432): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9610bc0 a2=3 a3=1 items=0 ppid=1 pid=5509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:09:58.627000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:58.704781 kernel: audit: type=1327 audit(1734098998.627:1432): proctitle=737368643A20636F7265205B707269765D Dec 13 14:09:58.699482 systemd-logind[1461]: New session 16 of user core. Dec 13 14:09:58.705152 systemd[1]: Started session-16.scope. Dec 13 14:09:58.708000 audit[5509]: USER_START pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.710000 audit[5511]: CRED_ACQ pid=5511 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.758766 kernel: audit: type=1105 audit(1734098998.708:1433): pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:58.758863 kernel: audit: type=1103 audit(1734098998.710:1434): pid=5511 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:59.017516 sshd[5509]: pam_unix(sshd:session): session closed for user core Dec 13 14:09:59.017000 audit[5509]: USER_END pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:59.020495 systemd-logind[1461]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:09:59.021592 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:09:59.022605 systemd-logind[1461]: Removed session 16. Dec 13 14:09:59.023155 systemd[1]: sshd@13-10.200.20.37:22-10.200.16.10:56354.service: Deactivated successfully. Dec 13 14:09:59.017000 audit[5509]: CRED_DISP pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:59.072378 kernel: audit: type=1106 audit(1734098999.017:1435): pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:59.072519 kernel: audit: type=1104 audit(1734098999.017:1436): pid=5509 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:09:59.017000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.37:22-10.200.16.10:56354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:09:59.130000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.130000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400e98a1b0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.130000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.130000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400ea1ef30 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.130000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.130000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400efe11c0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.130000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.145000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.145000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400ea1f0e0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.328000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.328000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400ea1fec0 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.332000 audit[2487]: AVC avc: denied { watch } for pid=2487 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.332000 audit[2487]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=75 a1=400f59f460 a2=fc6 a3=0 items=0 ppid=2332 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c316,c571 key=(null) Dec 13 14:09:59.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3337002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:59.617000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.617000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:59.617000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40026e7c00 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:59.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:59.617000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40018167b0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:09:59.617000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:00.275000 audit[4683]: AVC avc: denied { watch } for pid=4683 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.3115903554/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c725,c781 tclass=file permissive=0 Dec 13 14:10:00.275000 audit[4683]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40018c32c0 a2=fc6 a3=0 items=0 ppid=4294 pid=4683 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c725,c781 key=(null) Dec 13 14:10:00.275000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:04.090958 systemd[1]: Started sshd@14-10.200.20.37:22-10.200.16.10:42844.service. Dec 13 14:10:04.101360 kernel: kauditd_printk_skb: 28 callbacks suppressed Dec 13 14:10:04.101518 kernel: audit: type=1130 audit(1734099004.091:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.37:22-10.200.16.10:42844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:04.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.37:22-10.200.16.10:42844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:04.516000 audit[5544]: USER_ACCT pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.517537 sshd[5544]: Accepted publickey for core from 10.200.16.10 port 42844 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:04.519337 sshd[5544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:04.518000 audit[5544]: CRED_ACQ pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.567167 kernel: audit: type=1101 audit(1734099004.516:1448): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.567306 kernel: audit: type=1103 audit(1734099004.518:1449): pid=5544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.584238 kernel: audit: type=1006 audit(1734099004.518:1450): pid=5544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:10:04.571712 systemd-logind[1461]: New session 17 of user core. Dec 13 14:10:04.585590 systemd[1]: Started session-17.scope. Dec 13 14:10:04.518000 audit[5544]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccfde320 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:04.610564 kernel: audit: type=1300 audit(1734099004.518:1450): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffccfde320 a2=3 a3=1 items=0 ppid=1 pid=5544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:04.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:04.620260 kernel: audit: type=1327 audit(1734099004.518:1450): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:04.620000 audit[5544]: USER_START pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.647503 kernel: audit: type=1105 audit(1734099004.620:1451): pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.647000 audit[5546]: CRED_ACQ pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.669387 kernel: audit: type=1103 audit(1734099004.647:1452): pid=5546 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.983228 sshd[5544]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:04.984000 audit[5544]: USER_END pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.986289 systemd-logind[1461]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:10:04.987187 systemd[1]: sshd@14-10.200.20.37:22-10.200.16.10:42844.service: Deactivated successfully. Dec 13 14:10:04.987943 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:10:04.989389 systemd-logind[1461]: Removed session 17. Dec 13 14:10:04.984000 audit[5544]: CRED_DISP pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:05.031209 kernel: audit: type=1106 audit(1734099004.984:1453): pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:05.031341 kernel: audit: type=1104 audit(1734099004.984:1454): pid=5544 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:04.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.37:22-10.200.16.10:42844 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:05.715000 audit[5146]: AVC avc: denied { watch } for pid=5146 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_07_39.2633475739/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c828,c1007 tclass=file permissive=0 Dec 13 14:10:05.715000 audit[5146]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4001088020 a2=fc6 a3=0 items=0 ppid=4626 pid=5146 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c828,c1007 key=(null) Dec 13 14:10:05.715000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:10.056174 systemd[1]: Started sshd@15-10.200.20.37:22-10.200.16.10:54116.service. Dec 13 14:10:10.083708 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:10:10.083930 kernel: audit: type=1130 audit(1734099010.056:1457): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.37:22-10.200.16.10:54116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:10.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.37:22-10.200.16.10:54116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:10.475000 audit[5595]: USER_ACCT pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.475870 sshd[5595]: Accepted publickey for core from 10.200.16.10 port 54116 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:10.499000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.500721 sshd[5595]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:10.522452 kernel: audit: type=1101 audit(1734099010.475:1458): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.522610 kernel: audit: type=1103 audit(1734099010.499:1459): pid=5595 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.536931 kernel: audit: type=1006 audit(1734099010.499:1460): pid=5595 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 14:10:10.499000 audit[5595]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0c645a0 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:10.560788 kernel: audit: type=1300 audit(1734099010.499:1460): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd0c645a0 a2=3 a3=1 items=0 ppid=1 pid=5595 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:10.499000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:10.569102 kernel: audit: type=1327 audit(1734099010.499:1460): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:10.572277 systemd-logind[1461]: New session 18 of user core. Dec 13 14:10:10.572717 systemd[1]: Started session-18.scope. Dec 13 14:10:10.576000 audit[5595]: USER_START pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.602000 audit[5597]: CRED_ACQ pid=5597 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.623720 kernel: audit: type=1105 audit(1734099010.576:1461): pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.623858 kernel: audit: type=1103 audit(1734099010.602:1462): pid=5597 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.931000 audit[5595]: USER_END pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.930131 sshd[5595]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:10.959350 systemd[1]: sshd@15-10.200.20.37:22-10.200.16.10:54116.service: Deactivated successfully. Dec 13 14:10:10.931000 audit[5595]: CRED_DISP pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.982380 kernel: audit: type=1106 audit(1734099010.931:1463): pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.982467 kernel: audit: type=1104 audit(1734099010.931:1464): pid=5595 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:10.960154 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:10:10.982076 systemd-logind[1461]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:10:10.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.37:22-10.200.16.10:54116 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:10.983370 systemd-logind[1461]: Removed session 18. Dec 13 14:10:11.008624 systemd[1]: Started sshd@16-10.200.20.37:22-10.200.16.10:54122.service. Dec 13 14:10:11.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.37:22-10.200.16.10:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:11.428000 audit[5607]: USER_ACCT pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:11.428698 sshd[5607]: Accepted publickey for core from 10.200.16.10 port 54122 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:11.429000 audit[5607]: CRED_ACQ pid=5607 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:11.429000 audit[5607]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe54a9c00 a2=3 a3=1 items=0 ppid=1 pid=5607 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:11.429000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:11.430509 sshd[5607]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:11.435342 systemd[1]: Started session-19.scope. Dec 13 14:10:11.435796 systemd-logind[1461]: New session 19 of user core. Dec 13 14:10:11.440000 audit[5607]: USER_START pid=5607 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:11.441000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.020845 sshd[5607]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:12.021000 audit[5607]: USER_END pid=5607 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.022000 audit[5607]: CRED_DISP pid=5607 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.024403 systemd[1]: sshd@16-10.200.20.37:22-10.200.16.10:54122.service: Deactivated successfully. Dec 13 14:10:12.025190 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:10:12.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.37:22-10.200.16.10:54122 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:12.026111 systemd-logind[1461]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:10:12.026971 systemd-logind[1461]: Removed session 19. Dec 13 14:10:12.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.37:22-10.200.16.10:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:12.092319 systemd[1]: Started sshd@17-10.200.20.37:22-10.200.16.10:54128.service. Dec 13 14:10:12.500000 audit[5617]: USER_ACCT pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.501446 sshd[5617]: Accepted publickey for core from 10.200.16.10 port 54128 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:12.502000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.502000 audit[5617]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea4fd830 a2=3 a3=1 items=0 ppid=1 pid=5617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:12.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:12.503166 sshd[5617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:12.507955 systemd[1]: Started session-20.scope. Dec 13 14:10:12.509166 systemd-logind[1461]: New session 20 of user core. Dec 13 14:10:12.513000 audit[5617]: USER_START pid=5617 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:12.514000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.403000 audit[5629]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.403000 audit[5629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffe4bac2d0 a2=0 a3=1 items=0 ppid=2782 pid=5629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.411000 audit[5629]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.411000 audit[5629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=ffffe4bac2d0 a2=0 a3=1 items=0 ppid=2782 pid=5629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.422000 audit[5631]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=5631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.422000 audit[5631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff0db1aa0 a2=0 a3=1 items=0 ppid=2782 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.426000 audit[5631]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5631 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:14.426000 audit[5631]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff0db1aa0 a2=0 a3=1 items=0 ppid=2782 pid=5631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:14.497395 sshd[5617]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:14.498000 audit[5617]: USER_END pid=5617 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.498000 audit[5617]: CRED_DISP pid=5617 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.499904 systemd[1]: sshd@17-10.200.20.37:22-10.200.16.10:54128.service: Deactivated successfully. Dec 13 14:10:14.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.37:22-10.200.16.10:54128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:14.500668 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:10:14.501193 systemd-logind[1461]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:10:14.502189 systemd-logind[1461]: Removed session 20. Dec 13 14:10:14.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.37:22-10.200.16.10:54138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:14.565027 systemd[1]: Started sshd@18-10.200.20.37:22-10.200.16.10:54138.service. Dec 13 14:10:14.970000 audit[5634]: USER_ACCT pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.970901 sshd[5634]: Accepted publickey for core from 10.200.16.10 port 54138 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:14.971000 audit[5634]: CRED_ACQ pid=5634 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.971000 audit[5634]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd341bd70 a2=3 a3=1 items=0 ppid=1 pid=5634 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.971000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:14.972582 sshd[5634]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:14.976997 systemd[1]: Started session-21.scope. Dec 13 14:10:14.978120 systemd-logind[1461]: New session 21 of user core. Dec 13 14:10:14.982000 audit[5634]: USER_START pid=5634 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.983000 audit[5636]: CRED_ACQ pid=5636 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.459180 sshd[5634]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:15.460000 audit[5634]: USER_END pid=5634 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.462063 systemd-logind[1461]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:10:15.463546 systemd[1]: sshd@18-10.200.20.37:22-10.200.16.10:54138.service: Deactivated successfully. Dec 13 14:10:15.464257 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:10:15.465579 systemd-logind[1461]: Removed session 21. Dec 13 14:10:15.466582 kernel: kauditd_printk_skb: 43 callbacks suppressed Dec 13 14:10:15.466664 kernel: audit: type=1106 audit(1734099015.460:1494): pid=5634 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.460000 audit[5634]: CRED_DISP pid=5634 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.516330 kernel: audit: type=1104 audit(1734099015.460:1495): pid=5634 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.37:22-10.200.16.10:54138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:15.532395 systemd[1]: Started sshd@19-10.200.20.37:22-10.200.16.10:54150.service. Dec 13 14:10:15.537806 kernel: audit: type=1131 audit(1734099015.463:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.37:22-10.200.16.10:54138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:15.537995 kernel: audit: type=1130 audit(1734099015.532:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.37:22-10.200.16.10:54150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:15.532000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.37:22-10.200.16.10:54150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:15.946000 audit[5644]: USER_ACCT pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.948457 sshd[5644]: Accepted publickey for core from 10.200.16.10 port 54150 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:15.972346 kernel: audit: type=1101 audit(1734099015.946:1498): pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.973077 sshd[5644]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:15.972000 audit[5644]: CRED_ACQ pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.978181 systemd[1]: Started session-22.scope. Dec 13 14:10:15.979825 systemd-logind[1461]: New session 22 of user core. Dec 13 14:10:16.010968 kernel: audit: type=1103 audit(1734099015.972:1499): pid=5644 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:16.011101 kernel: audit: type=1006 audit(1734099015.972:1500): pid=5644 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:10:16.011136 kernel: audit: type=1300 audit(1734099015.972:1500): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda24ae00 a2=3 a3=1 items=0 ppid=1 pid=5644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.972000 audit[5644]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffda24ae00 a2=3 a3=1 items=0 ppid=1 pid=5644 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:16.045988 kernel: audit: type=1327 audit(1734099015.972:1500): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:16.046085 kernel: audit: type=1105 audit(1734099015.984:1501): pid=5644 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.984000 audit[5644]: USER_START pid=5644 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.985000 audit[5646]: CRED_ACQ pid=5646 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:16.344908 sshd[5644]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:16.348853 systemd-logind[1461]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:10:16.346000 audit[5644]: USER_END pid=5644 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:16.346000 audit[5644]: CRED_DISP pid=5644 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:16.350263 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:10:16.351527 systemd[1]: sshd@19-10.200.20.37:22-10.200.16.10:54150.service: Deactivated successfully. Dec 13 14:10:16.351000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.37:22-10.200.16.10:54150 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:16.352859 systemd-logind[1461]: Removed session 22. Dec 13 14:10:16.729000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:16.729000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002cc5920 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:10:16.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:16.729000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:16.729000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002d1fdc0 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:10:16.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:16.737000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:16.737000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002cc5940 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:10:16.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:16.737000 audit[2426]: AVC avc: denied { watch } for pid=2426 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:16.737000 audit[2426]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002cc5960 a2=fc6 a3=0 items=0 ppid=2289 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c704,c890 key=(null) Dec 13 14:10:16.737000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:20.397000 audit[5659]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.397000 audit[5659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffcd5aa8f0 a2=0 a3=1 items=0 ppid=2782 pid=5659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:20.404000 audit[5659]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=5659 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:20.404000 audit[5659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffcd5aa8f0 a2=0 a3=1 items=0 ppid=2782 pid=5659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.404000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:21.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.37:22-10.200.16.10:59718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:21.413180 systemd[1]: Started sshd@20-10.200.20.37:22-10.200.16.10:59718.service. Dec 13 14:10:21.418379 kernel: kauditd_printk_skb: 22 callbacks suppressed Dec 13 14:10:21.418544 kernel: audit: type=1130 audit(1734099021.412:1512): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.37:22-10.200.16.10:59718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:21.821648 sshd[5662]: Accepted publickey for core from 10.200.16.10 port 59718 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:21.820000 audit[5662]: USER_ACCT pid=5662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.823200 sshd[5662]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:21.821000 audit[5662]: CRED_ACQ pid=5662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.870352 kernel: audit: type=1101 audit(1734099021.820:1513): pid=5662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.870481 kernel: audit: type=1103 audit(1734099021.821:1514): pid=5662 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.885053 kernel: audit: type=1006 audit(1734099021.821:1515): pid=5662 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:10:21.821000 audit[5662]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5f19230 a2=3 a3=1 items=0 ppid=1 pid=5662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:21.909992 kernel: audit: type=1300 audit(1734099021.821:1515): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5f19230 a2=3 a3=1 items=0 ppid=1 pid=5662 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:21.821000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:21.919783 kernel: audit: type=1327 audit(1734099021.821:1515): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:21.918942 systemd-logind[1461]: New session 23 of user core. Dec 13 14:10:21.919126 systemd[1]: Started session-23.scope. Dec 13 14:10:21.923000 audit[5662]: USER_START pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.952318 kernel: audit: type=1105 audit(1734099021.923:1516): pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.952532 kernel: audit: type=1103 audit(1734099021.924:1517): pid=5667 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.924000 audit[5667]: CRED_ACQ pid=5667 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:22.245029 sshd[5662]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:22.245000 audit[5662]: USER_END pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:22.250332 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:10:22.252989 systemd[1]: sshd@20-10.200.20.37:22-10.200.16.10:59718.service: Deactivated successfully. Dec 13 14:10:22.247000 audit[5662]: CRED_DISP pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:22.274093 systemd-logind[1461]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:10:22.274882 systemd-logind[1461]: Removed session 23. Dec 13 14:10:22.294451 kernel: audit: type=1106 audit(1734099022.245:1518): pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:22.294587 kernel: audit: type=1104 audit(1734099022.247:1519): pid=5662 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:22.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.37:22-10.200.16.10:59718 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.37:22-10.200.16.10:59726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.313729 systemd[1]: Started sshd@21-10.200.20.37:22-10.200.16.10:59726.service. Dec 13 14:10:27.319232 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:27.319359 kernel: audit: type=1130 audit(1734099027.312:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.37:22-10.200.16.10:59726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.722000 audit[5677]: USER_ACCT pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.724115 sshd[5677]: Accepted publickey for core from 10.200.16.10 port 59726 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:27.749347 kernel: audit: type=1101 audit(1734099027.722:1522): pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.747000 audit[5677]: CRED_ACQ pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.749721 sshd[5677]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:27.787161 kernel: audit: type=1103 audit(1734099027.747:1523): pid=5677 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.787291 kernel: audit: type=1006 audit(1734099027.748:1524): pid=5677 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:10:27.748000 audit[5677]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff07a5660 a2=3 a3=1 items=0 ppid=1 pid=5677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.792628 systemd-logind[1461]: New session 24 of user core. Dec 13 14:10:27.798114 systemd[1]: Started session-24.scope. Dec 13 14:10:27.811059 kernel: audit: type=1300 audit(1734099027.748:1524): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff07a5660 a2=3 a3=1 items=0 ppid=1 pid=5677 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.748000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:27.819134 kernel: audit: type=1327 audit(1734099027.748:1524): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:27.819222 kernel: audit: type=1105 audit(1734099027.801:1525): pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.801000 audit[5677]: USER_START pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.803000 audit[5679]: CRED_ACQ pid=5679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.865156 kernel: audit: type=1103 audit(1734099027.803:1526): pid=5679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.124781 sshd[5677]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:28.124000 audit[5677]: USER_END pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.124000 audit[5677]: CRED_DISP pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.152151 systemd[1]: sshd@21-10.200.20.37:22-10.200.16.10:59726.service: Deactivated successfully. Dec 13 14:10:28.152952 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:10:28.172749 kernel: audit: type=1106 audit(1734099028.124:1527): pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.172868 kernel: audit: type=1104 audit(1734099028.124:1528): pid=5677 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:28.173706 systemd-logind[1461]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:10:28.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.37:22-10.200.16.10:59726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:28.174608 systemd-logind[1461]: Removed session 24. Dec 13 14:10:33.197199 systemd[1]: Started sshd@22-10.200.20.37:22-10.200.16.10:51510.service. Dec 13 14:10:33.225449 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:33.225572 kernel: audit: type=1130 audit(1734099033.196:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.37:22-10.200.16.10:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:33.196000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.37:22-10.200.16.10:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:33.621000 audit[5696]: USER_ACCT pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.622883 sshd[5696]: Accepted publickey for core from 10.200.16.10 port 51510 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:33.624819 sshd[5696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:33.623000 audit[5696]: CRED_ACQ pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.670559 kernel: audit: type=1101 audit(1734099033.621:1531): pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.670690 kernel: audit: type=1103 audit(1734099033.623:1532): pid=5696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.684717 kernel: audit: type=1006 audit(1734099033.623:1533): pid=5696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:10:33.623000 audit[5696]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd89353d0 a2=3 a3=1 items=0 ppid=1 pid=5696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.708719 kernel: audit: type=1300 audit(1734099033.623:1533): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd89353d0 a2=3 a3=1 items=0 ppid=1 pid=5696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.623000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:33.712706 systemd[1]: Started session-25.scope. Dec 13 14:10:33.713993 systemd-logind[1461]: New session 25 of user core. Dec 13 14:10:33.716903 kernel: audit: type=1327 audit(1734099033.623:1533): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:33.718000 audit[5696]: USER_START pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.719000 audit[5698]: CRED_ACQ pid=5698 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.766969 kernel: audit: type=1105 audit(1734099033.718:1534): pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.767163 kernel: audit: type=1103 audit(1734099033.719:1535): pid=5698 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.807085 systemd[1]: run-containerd-runc-k8s.io-89af52648057cf7f87001b50b30eb978db84025d6678dc18ccae67a039783f12-runc.5MBZH7.mount: Deactivated successfully. Dec 13 14:10:34.039393 sshd[5696]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:34.039000 audit[5696]: USER_END pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.042785 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:10:34.043545 systemd[1]: sshd@22-10.200.20.37:22-10.200.16.10:51510.service: Deactivated successfully. Dec 13 14:10:34.040000 audit[5696]: CRED_DISP pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.089165 kernel: audit: type=1106 audit(1734099034.039:1536): pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.089294 kernel: audit: type=1104 audit(1734099034.040:1537): pid=5696 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.089288 systemd-logind[1461]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:10:34.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.37:22-10.200.16.10:51510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.090493 systemd-logind[1461]: Removed session 25. Dec 13 14:10:39.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.37:22-10.200.16.10:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:39.119065 systemd[1]: Started sshd@23-10.200.20.37:22-10.200.16.10:58784.service. Dec 13 14:10:39.124189 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:39.124314 kernel: audit: type=1130 audit(1734099039.117:1539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.37:22-10.200.16.10:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:39.533468 sshd[5732]: Accepted publickey for core from 10.200.16.10 port 58784 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:39.532000 audit[5732]: USER_ACCT pid=5732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.535008 sshd[5732]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:39.533000 audit[5732]: CRED_ACQ pid=5732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.588133 kernel: audit: type=1101 audit(1734099039.532:1540): pid=5732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.588277 kernel: audit: type=1103 audit(1734099039.533:1541): pid=5732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.602153 kernel: audit: type=1006 audit(1734099039.533:1542): pid=5732 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:10:39.533000 audit[5732]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6e348a0 a2=3 a3=1 items=0 ppid=1 pid=5732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:39.626925 kernel: audit: type=1300 audit(1734099039.533:1542): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6e348a0 a2=3 a3=1 items=0 ppid=1 pid=5732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:39.533000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:39.632001 systemd[1]: Started session-26.scope. Dec 13 14:10:39.633996 systemd-logind[1461]: New session 26 of user core. Dec 13 14:10:39.636658 kernel: audit: type=1327 audit(1734099039.533:1542): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:39.638000 audit[5732]: USER_START pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.664000 audit[5734]: CRED_ACQ pid=5734 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.687202 kernel: audit: type=1105 audit(1734099039.638:1543): pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.687360 kernel: audit: type=1103 audit(1734099039.664:1544): pid=5734 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.786537 systemd[1]: run-containerd-runc-k8s.io-5bbc3ef478dbfe67b5bc63fb310e61a8781ab4bf2924133fee9815bb8b193aa0-runc.QuHNcG.mount: Deactivated successfully. Dec 13 14:10:39.995061 sshd[5732]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:39.995000 audit[5732]: USER_END pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:39.998494 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:10:39.999212 systemd[1]: sshd@23-10.200.20.37:22-10.200.16.10:58784.service: Deactivated successfully. Dec 13 14:10:39.995000 audit[5732]: CRED_DISP pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.045164 kernel: audit: type=1106 audit(1734099039.995:1545): pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.045314 kernel: audit: type=1104 audit(1734099039.995:1546): pid=5732 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.045464 systemd-logind[1461]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:10:39.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.37:22-10.200.16.10:58784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:40.046934 systemd-logind[1461]: Removed session 26. Dec 13 14:10:45.097298 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:45.097406 kernel: audit: type=1130 audit(1734099045.065:1548): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.37:22-10.200.16.10:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:45.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.37:22-10.200.16.10:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:45.066555 systemd[1]: Started sshd@24-10.200.20.37:22-10.200.16.10:58800.service. Dec 13 14:10:45.492939 sshd[5767]: Accepted publickey for core from 10.200.16.10 port 58800 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:45.491000 audit[5767]: USER_ACCT pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.497513 sshd[5767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:45.491000 audit[5767]: CRED_ACQ pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.522499 systemd[1]: Started session-27.scope. Dec 13 14:10:45.523942 systemd-logind[1461]: New session 27 of user core. Dec 13 14:10:45.544667 kernel: audit: type=1101 audit(1734099045.491:1549): pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.544872 kernel: audit: type=1103 audit(1734099045.491:1550): pid=5767 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.560063 kernel: audit: type=1006 audit(1734099045.491:1551): pid=5767 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:10:45.560194 kernel: audit: type=1300 audit(1734099045.491:1551): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8151e60 a2=3 a3=1 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:45.491000 audit[5767]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8151e60 a2=3 a3=1 items=0 ppid=1 pid=5767 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:45.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:45.594458 kernel: audit: type=1327 audit(1734099045.491:1551): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:45.594601 kernel: audit: type=1105 audit(1734099045.523:1552): pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.523000 audit[5767]: USER_START pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.528000 audit[5769]: CRED_ACQ pid=5769 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.647836 kernel: audit: type=1103 audit(1734099045.528:1553): pid=5769 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.888360 sshd[5767]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:45.888000 audit[5767]: USER_END pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.892429 systemd-logind[1461]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:10:45.893820 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:10:45.895189 systemd-logind[1461]: Removed session 27. Dec 13 14:10:45.895987 systemd[1]: sshd@24-10.200.20.37:22-10.200.16.10:58800.service: Deactivated successfully. Dec 13 14:10:45.888000 audit[5767]: CRED_DISP pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.941304 kernel: audit: type=1106 audit(1734099045.888:1554): pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.941422 kernel: audit: type=1104 audit(1734099045.888:1555): pid=5767 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:45.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.37:22-10.200.16.10:58800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:50.960409 systemd[1]: Started sshd@25-10.200.20.37:22-10.200.16.10:49044.service. Dec 13 14:10:50.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.37:22-10.200.16.10:49044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:50.966413 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:50.966518 kernel: audit: type=1130 audit(1734099050.959:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.37:22-10.200.16.10:49044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:51.378000 audit[5780]: USER_ACCT pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.379987 sshd[5780]: Accepted publickey for core from 10.200.16.10 port 49044 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:51.406309 kernel: audit: type=1101 audit(1734099051.378:1558): pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.407099 sshd[5780]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:51.405000 audit[5780]: CRED_ACQ pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.433833 systemd-logind[1461]: New session 28 of user core. Dec 13 14:10:51.434456 systemd[1]: Started session-28.scope. Dec 13 14:10:51.443792 kernel: audit: type=1103 audit(1734099051.405:1559): pid=5780 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.443913 kernel: audit: type=1006 audit(1734099051.405:1560): pid=5780 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:10:51.405000 audit[5780]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd30d6ea0 a2=3 a3=1 items=0 ppid=1 pid=5780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:51.467237 kernel: audit: type=1300 audit(1734099051.405:1560): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd30d6ea0 a2=3 a3=1 items=0 ppid=1 pid=5780 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:51.405000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:51.475542 kernel: audit: type=1327 audit(1734099051.405:1560): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:51.438000 audit[5780]: USER_START pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.502114 kernel: audit: type=1105 audit(1734099051.438:1561): pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.502239 kernel: audit: type=1103 audit(1734099051.440:1562): pid=5782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.440000 audit[5782]: CRED_ACQ pid=5782 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.790688 sshd[5780]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:51.791000 audit[5780]: USER_END pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.798673 systemd-logind[1461]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:10:51.799960 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:10:51.801249 systemd-logind[1461]: Removed session 28. Dec 13 14:10:51.801967 systemd[1]: sshd@25-10.200.20.37:22-10.200.16.10:49044.service: Deactivated successfully. Dec 13 14:10:51.791000 audit[5780]: CRED_DISP pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.840095 kernel: audit: type=1106 audit(1734099051.791:1563): pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.840214 kernel: audit: type=1104 audit(1734099051.791:1564): pid=5780 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:51.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.37:22-10.200.16.10:49044 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'