Dec 13 14:05:53.042216 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Dec 13 14:05:53.042236 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Dec 13 12:58:58 -00 2024 Dec 13 14:05:53.042244 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Dec 13 14:05:53.042251 kernel: printk: bootconsole [pl11] enabled Dec 13 14:05:53.042256 kernel: efi: EFI v2.70 by EDK II Dec 13 14:05:53.042262 kernel: efi: ACPI 2.0=0x3fd5f018 SMBIOS=0x3e580000 SMBIOS 3.0=0x3e560000 MEMATTR=0x3f214018 RNG=0x3fd5f998 MEMRESERVE=0x3763cf98 Dec 13 14:05:53.042269 kernel: random: crng init done Dec 13 14:05:53.042274 kernel: ACPI: Early table checksum verification disabled Dec 13 14:05:53.042279 kernel: ACPI: RSDP 0x000000003FD5F018 000024 (v02 VRTUAL) Dec 13 14:05:53.042285 kernel: ACPI: XSDT 0x000000003FD5FF18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042290 kernel: ACPI: FACP 0x000000003FD5FC18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042296 kernel: ACPI: DSDT 0x000000003FD41018 01DFCD (v02 MSFTVM DSDT01 00000001 INTL 20230628) Dec 13 14:05:53.042302 kernel: ACPI: DBG2 0x000000003FD5FB18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042308 kernel: ACPI: GTDT 0x000000003FD5FD98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042314 kernel: ACPI: OEM0 0x000000003FD5F098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042334 kernel: ACPI: SPCR 0x000000003FD5FA98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042341 kernel: ACPI: APIC 0x000000003FD5F818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042349 kernel: ACPI: SRAT 0x000000003FD5F198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042354 kernel: ACPI: PPTT 0x000000003FD5F418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Dec 13 14:05:53.042360 kernel: ACPI: BGRT 0x000000003FD5FE98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 14:05:53.042366 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Dec 13 14:05:53.042371 kernel: NUMA: Failed to initialise from firmware Dec 13 14:05:53.042377 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:05:53.042383 kernel: NUMA: NODE_DATA [mem 0x1bf7f3900-0x1bf7f8fff] Dec 13 14:05:53.042388 kernel: Zone ranges: Dec 13 14:05:53.042394 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Dec 13 14:05:53.042399 kernel: DMA32 empty Dec 13 14:05:53.042405 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:05:53.042412 kernel: Movable zone start for each node Dec 13 14:05:53.042417 kernel: Early memory node ranges Dec 13 14:05:53.042423 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Dec 13 14:05:53.042429 kernel: node 0: [mem 0x0000000000824000-0x000000003e54ffff] Dec 13 14:05:53.042434 kernel: node 0: [mem 0x000000003e550000-0x000000003e87ffff] Dec 13 14:05:53.042440 kernel: node 0: [mem 0x000000003e880000-0x000000003fc7ffff] Dec 13 14:05:53.042446 kernel: node 0: [mem 0x000000003fc80000-0x000000003fcfffff] Dec 13 14:05:53.042451 kernel: node 0: [mem 0x000000003fd00000-0x000000003fffffff] Dec 13 14:05:53.042457 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Dec 13 14:05:53.042463 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Dec 13 14:05:53.042468 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Dec 13 14:05:53.042474 kernel: psci: probing for conduit method from ACPI. Dec 13 14:05:53.042484 kernel: psci: PSCIv1.1 detected in firmware. Dec 13 14:05:53.042489 kernel: psci: Using standard PSCI v0.2 function IDs Dec 13 14:05:53.042496 kernel: psci: MIGRATE_INFO_TYPE not supported. Dec 13 14:05:53.042501 kernel: psci: SMC Calling Convention v1.4 Dec 13 14:05:53.042507 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Dec 13 14:05:53.042515 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Dec 13 14:05:53.042521 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Dec 13 14:05:53.042527 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Dec 13 14:05:53.042533 kernel: pcpu-alloc: [0] 0 [0] 1 Dec 13 14:05:53.042539 kernel: Detected PIPT I-cache on CPU0 Dec 13 14:05:53.042545 kernel: CPU features: detected: GIC system register CPU interface Dec 13 14:05:53.042552 kernel: CPU features: detected: Hardware dirty bit management Dec 13 14:05:53.042558 kernel: CPU features: detected: Spectre-BHB Dec 13 14:05:53.042564 kernel: CPU features: kernel page table isolation forced ON by KASLR Dec 13 14:05:53.042570 kernel: CPU features: detected: Kernel page table isolation (KPTI) Dec 13 14:05:53.042576 kernel: CPU features: detected: ARM erratum 1418040 Dec 13 14:05:53.042583 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Dec 13 14:05:53.042590 kernel: CPU features: detected: SSBS not fully self-synchronizing Dec 13 14:05:53.042596 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Dec 13 14:05:53.042602 kernel: Policy zone: Normal Dec 13 14:05:53.042609 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:05:53.042616 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 14:05:53.042622 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 14:05:53.042628 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Dec 13 14:05:53.042635 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 14:05:53.042641 kernel: software IO TLB: mapped [mem 0x000000003a550000-0x000000003e550000] (64MB) Dec 13 14:05:53.042648 kernel: Memory: 3986944K/4194160K available (9792K kernel code, 2092K rwdata, 7576K rodata, 36416K init, 777K bss, 207216K reserved, 0K cma-reserved) Dec 13 14:05:53.042655 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 14:05:53.042661 kernel: trace event string verifier disabled Dec 13 14:05:53.042667 kernel: rcu: Preemptible hierarchical RCU implementation. Dec 13 14:05:53.042674 kernel: rcu: RCU event tracing is enabled. Dec 13 14:05:53.042680 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 14:05:53.042686 kernel: Trampoline variant of Tasks RCU enabled. Dec 13 14:05:53.042693 kernel: Tracing variant of Tasks RCU enabled. Dec 13 14:05:53.042699 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 14:05:53.042705 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 14:05:53.042711 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Dec 13 14:05:53.042717 kernel: GICv3: 960 SPIs implemented Dec 13 14:05:53.042724 kernel: GICv3: 0 Extended SPIs implemented Dec 13 14:05:53.042730 kernel: GICv3: Distributor has no Range Selector support Dec 13 14:05:53.042736 kernel: Root IRQ handler: gic_handle_irq Dec 13 14:05:53.042742 kernel: GICv3: 16 PPIs implemented Dec 13 14:05:53.042748 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Dec 13 14:05:53.042754 kernel: ITS: No ITS available, not enabling LPIs Dec 13 14:05:53.042760 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:05:53.042766 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Dec 13 14:05:53.042773 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Dec 13 14:05:53.042779 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Dec 13 14:05:53.042785 kernel: Console: colour dummy device 80x25 Dec 13 14:05:53.042793 kernel: printk: console [tty1] enabled Dec 13 14:05:53.042799 kernel: ACPI: Core revision 20210730 Dec 13 14:05:53.042806 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Dec 13 14:05:53.042812 kernel: pid_max: default: 32768 minimum: 301 Dec 13 14:05:53.042819 kernel: LSM: Security Framework initializing Dec 13 14:05:53.042825 kernel: SELinux: Initializing. Dec 13 14:05:53.042831 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:05:53.042837 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Dec 13 14:05:53.042844 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Dec 13 14:05:53.042851 kernel: Hyper-V: Host Build 10.0.22477.1594-1-0 Dec 13 14:05:53.042857 kernel: rcu: Hierarchical SRCU implementation. Dec 13 14:05:53.042863 kernel: Remapping and enabling EFI services. Dec 13 14:05:53.042870 kernel: smp: Bringing up secondary CPUs ... Dec 13 14:05:53.042876 kernel: Detected PIPT I-cache on CPU1 Dec 13 14:05:53.042882 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Dec 13 14:05:53.042888 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Dec 13 14:05:53.042894 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Dec 13 14:05:53.042901 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 14:05:53.042907 kernel: SMP: Total of 2 processors activated. Dec 13 14:05:53.042914 kernel: CPU features: detected: 32-bit EL0 Support Dec 13 14:05:53.042921 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Dec 13 14:05:53.042927 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Dec 13 14:05:53.042934 kernel: CPU features: detected: CRC32 instructions Dec 13 14:05:53.042940 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Dec 13 14:05:53.042946 kernel: CPU features: detected: LSE atomic instructions Dec 13 14:05:53.042952 kernel: CPU features: detected: Privileged Access Never Dec 13 14:05:53.042959 kernel: CPU: All CPU(s) started at EL1 Dec 13 14:05:53.042965 kernel: alternatives: patching kernel code Dec 13 14:05:53.042972 kernel: devtmpfs: initialized Dec 13 14:05:53.042983 kernel: KASLR enabled Dec 13 14:05:53.042990 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 14:05:53.042998 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 14:05:53.043004 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 14:05:53.043011 kernel: SMBIOS 3.1.0 present. Dec 13 14:05:53.043018 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 09/28/2024 Dec 13 14:05:53.043024 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 14:05:53.043031 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Dec 13 14:05:53.043039 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Dec 13 14:05:53.043046 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Dec 13 14:05:53.043052 kernel: audit: initializing netlink subsys (disabled) Dec 13 14:05:53.043059 kernel: audit: type=2000 audit(0.095:1): state=initialized audit_enabled=0 res=1 Dec 13 14:05:53.043065 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 14:05:53.043072 kernel: cpuidle: using governor menu Dec 13 14:05:53.043078 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Dec 13 14:05:53.043086 kernel: ASID allocator initialised with 32768 entries Dec 13 14:05:53.043093 kernel: ACPI: bus type PCI registered Dec 13 14:05:53.043100 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 14:05:53.043106 kernel: Serial: AMBA PL011 UART driver Dec 13 14:05:53.043113 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 14:05:53.043119 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Dec 13 14:05:53.043126 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 14:05:53.043133 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Dec 13 14:05:53.043139 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 14:05:53.043147 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Dec 13 14:05:53.043154 kernel: ACPI: Added _OSI(Module Device) Dec 13 14:05:53.043161 kernel: ACPI: Added _OSI(Processor Device) Dec 13 14:05:53.043167 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 14:05:53.043174 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 14:05:53.043180 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 14:05:53.043186 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 14:05:53.043193 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 14:05:53.043200 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 14:05:53.043207 kernel: ACPI: Interpreter enabled Dec 13 14:05:53.043214 kernel: ACPI: Using GIC for interrupt routing Dec 13 14:05:53.043221 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Dec 13 14:05:53.043227 kernel: printk: console [ttyAMA0] enabled Dec 13 14:05:53.043233 kernel: printk: bootconsole [pl11] disabled Dec 13 14:05:53.043240 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Dec 13 14:05:53.043247 kernel: iommu: Default domain type: Translated Dec 13 14:05:53.043253 kernel: iommu: DMA domain TLB invalidation policy: strict mode Dec 13 14:05:53.043260 kernel: vgaarb: loaded Dec 13 14:05:53.043266 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 14:05:53.043274 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 14:05:53.043280 kernel: PTP clock support registered Dec 13 14:05:53.043287 kernel: Registered efivars operations Dec 13 14:05:53.043293 kernel: No ACPI PMU IRQ for CPU0 Dec 13 14:05:53.043300 kernel: No ACPI PMU IRQ for CPU1 Dec 13 14:05:53.043306 kernel: clocksource: Switched to clocksource arch_sys_counter Dec 13 14:05:53.043313 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 14:05:53.043332 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 14:05:53.043341 kernel: pnp: PnP ACPI init Dec 13 14:05:53.043347 kernel: pnp: PnP ACPI: found 0 devices Dec 13 14:05:53.043354 kernel: NET: Registered PF_INET protocol family Dec 13 14:05:53.043360 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 14:05:53.043367 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Dec 13 14:05:53.043374 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 14:05:53.043380 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Dec 13 14:05:53.043387 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Dec 13 14:05:53.043394 kernel: TCP: Hash tables configured (established 32768 bind 32768) Dec 13 14:05:53.043401 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:05:53.043408 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Dec 13 14:05:53.043415 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 14:05:53.043421 kernel: PCI: CLS 0 bytes, default 64 Dec 13 14:05:53.043428 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Dec 13 14:05:53.043435 kernel: kvm [1]: HYP mode not available Dec 13 14:05:53.043441 kernel: Initialise system trusted keyrings Dec 13 14:05:53.043447 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Dec 13 14:05:53.043454 kernel: Key type asymmetric registered Dec 13 14:05:53.043462 kernel: Asymmetric key parser 'x509' registered Dec 13 14:05:53.043468 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 14:05:53.043475 kernel: io scheduler mq-deadline registered Dec 13 14:05:53.043481 kernel: io scheduler kyber registered Dec 13 14:05:53.043488 kernel: io scheduler bfq registered Dec 13 14:05:53.043494 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 14:05:53.043501 kernel: thunder_xcv, ver 1.0 Dec 13 14:05:53.043507 kernel: thunder_bgx, ver 1.0 Dec 13 14:05:53.043514 kernel: nicpf, ver 1.0 Dec 13 14:05:53.043520 kernel: nicvf, ver 1.0 Dec 13 14:05:53.043643 kernel: rtc-efi rtc-efi.0: registered as rtc0 Dec 13 14:05:53.043704 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-12-13T14:05:52 UTC (1734098752) Dec 13 14:05:53.043714 kernel: efifb: probing for efifb Dec 13 14:05:53.043721 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 14:05:53.043727 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 14:05:53.043734 kernel: efifb: scrolling: redraw Dec 13 14:05:53.043740 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 14:05:53.043749 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:05:53.043756 kernel: fb0: EFI VGA frame buffer device Dec 13 14:05:53.043762 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Dec 13 14:05:53.043769 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 14:05:53.043775 kernel: NET: Registered PF_INET6 protocol family Dec 13 14:05:53.043782 kernel: Segment Routing with IPv6 Dec 13 14:05:53.043788 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 14:05:53.043795 kernel: NET: Registered PF_PACKET protocol family Dec 13 14:05:53.043801 kernel: Key type dns_resolver registered Dec 13 14:05:53.043808 kernel: registered taskstats version 1 Dec 13 14:05:53.043815 kernel: Loading compiled-in X.509 certificates Dec 13 14:05:53.043822 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: e011ba9949ade5a6d03f7a5e28171f7f59e70f8a' Dec 13 14:05:53.043829 kernel: Key type .fscrypt registered Dec 13 14:05:53.043835 kernel: Key type fscrypt-provisioning registered Dec 13 14:05:53.043841 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 14:05:53.043848 kernel: ima: Allocated hash algorithm: sha1 Dec 13 14:05:53.043855 kernel: ima: No architecture policies found Dec 13 14:05:53.043861 kernel: clk: Disabling unused clocks Dec 13 14:05:53.043869 kernel: Freeing unused kernel memory: 36416K Dec 13 14:05:53.043876 kernel: Run /init as init process Dec 13 14:05:53.043882 kernel: with arguments: Dec 13 14:05:53.043889 kernel: /init Dec 13 14:05:53.043895 kernel: with environment: Dec 13 14:05:53.043901 kernel: HOME=/ Dec 13 14:05:53.043908 kernel: TERM=linux Dec 13 14:05:53.043914 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 14:05:53.043923 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:05:53.043933 systemd[1]: Detected virtualization microsoft. Dec 13 14:05:53.043940 systemd[1]: Detected architecture arm64. Dec 13 14:05:53.043947 systemd[1]: Running in initrd. Dec 13 14:05:53.043953 systemd[1]: No hostname configured, using default hostname. Dec 13 14:05:53.043960 systemd[1]: Hostname set to . Dec 13 14:05:53.043968 systemd[1]: Initializing machine ID from random generator. Dec 13 14:05:53.043974 systemd[1]: Queued start job for default target initrd.target. Dec 13 14:05:53.043983 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:05:53.043990 systemd[1]: Reached target cryptsetup.target. Dec 13 14:05:53.043997 systemd[1]: Reached target paths.target. Dec 13 14:05:53.044004 systemd[1]: Reached target slices.target. Dec 13 14:05:53.044011 systemd[1]: Reached target swap.target. Dec 13 14:05:53.044018 systemd[1]: Reached target timers.target. Dec 13 14:05:53.044025 systemd[1]: Listening on iscsid.socket. Dec 13 14:05:53.044033 systemd[1]: Listening on iscsiuio.socket. Dec 13 14:05:53.044041 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 14:05:53.044048 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 14:05:53.044055 systemd[1]: Listening on systemd-journald.socket. Dec 13 14:05:53.044062 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:05:53.044069 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:05:53.044076 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:05:53.044083 systemd[1]: Reached target sockets.target. Dec 13 14:05:53.044091 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:05:53.044097 systemd[1]: Finished network-cleanup.service. Dec 13 14:05:53.044105 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 14:05:53.044112 systemd[1]: Starting systemd-journald.service... Dec 13 14:05:53.044119 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:05:53.044126 systemd[1]: Starting systemd-resolved.service... Dec 13 14:05:53.044134 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 14:05:53.044144 systemd-journald[276]: Journal started Dec 13 14:05:53.044183 systemd-journald[276]: Runtime Journal (/run/log/journal/fff44cda35a34e5fa55daad13016f654) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:05:53.025508 systemd-modules-load[277]: Inserted module 'overlay' Dec 13 14:05:53.066229 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 14:05:53.074356 kernel: Bridge firewalling registered Dec 13 14:05:53.074409 systemd[1]: Started systemd-journald.service. Dec 13 14:05:53.074489 systemd-modules-load[277]: Inserted module 'br_netfilter' Dec 13 14:05:53.083367 systemd-resolved[278]: Positive Trust Anchors: Dec 13 14:05:53.083375 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:05:53.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.083402 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:05:53.158948 kernel: audit: type=1130 audit(1734098753.105:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.158973 kernel: SCSI subsystem initialized Dec 13 14:05:53.085491 systemd-resolved[278]: Defaulting to hostname 'linux'. Dec 13 14:05:53.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.123631 systemd[1]: Started systemd-resolved.service. Dec 13 14:05:53.220826 kernel: audit: type=1130 audit(1734098753.163:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.220849 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 14:05:53.220858 kernel: audit: type=1130 audit(1734098753.189:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.220867 kernel: device-mapper: uevent: version 1.0.3 Dec 13 14:05:53.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.163599 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:05:53.259091 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 14:05:53.259110 kernel: audit: type=1130 audit(1734098753.237:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.189575 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 14:05:53.288854 kernel: audit: type=1130 audit(1734098753.264:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.237654 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 14:05:53.264946 systemd[1]: Reached target nss-lookup.target. Dec 13 14:05:53.298487 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 14:05:53.298706 systemd-modules-load[277]: Inserted module 'dm_multipath' Dec 13 14:05:53.314062 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:05:53.334483 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:05:53.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.362464 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 14:05:53.367566 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:05:53.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.400709 systemd[1]: Starting dracut-cmdline.service... Dec 13 14:05:53.427103 kernel: audit: type=1130 audit(1734098753.339:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.427127 kernel: audit: type=1130 audit(1734098753.367:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.427137 kernel: audit: type=1130 audit(1734098753.376:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.427223 dracut-cmdline[296]: dracut-dracut-053 Dec 13 14:05:53.427223 dracut-cmdline[296]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Dec 13 14:05:53.427223 dracut-cmdline[296]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=5997a8cf94b1df1856dc785f0a7074604bbf4c21fdcca24a1996021471a77601 Dec 13 14:05:53.436398 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:05:53.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.479011 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:05:53.509432 kernel: audit: type=1130 audit(1734098753.483:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.541345 kernel: Loading iSCSI transport class v2.0-870. Dec 13 14:05:53.557343 kernel: iscsi: registered transport (tcp) Dec 13 14:05:53.579377 kernel: iscsi: registered transport (qla4xxx) Dec 13 14:05:53.579438 kernel: QLogic iSCSI HBA Driver Dec 13 14:05:53.611127 systemd[1]: Finished dracut-cmdline.service. Dec 13 14:05:53.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:53.619697 systemd[1]: Starting dracut-pre-udev.service... Dec 13 14:05:53.672350 kernel: raid6: neonx8 gen() 13820 MB/s Dec 13 14:05:53.692341 kernel: raid6: neonx8 xor() 10833 MB/s Dec 13 14:05:53.712334 kernel: raid6: neonx4 gen() 13568 MB/s Dec 13 14:05:53.733332 kernel: raid6: neonx4 xor() 11263 MB/s Dec 13 14:05:53.753334 kernel: raid6: neonx2 gen() 12934 MB/s Dec 13 14:05:53.773330 kernel: raid6: neonx2 xor() 10357 MB/s Dec 13 14:05:53.794337 kernel: raid6: neonx1 gen() 10524 MB/s Dec 13 14:05:53.815334 kernel: raid6: neonx1 xor() 8773 MB/s Dec 13 14:05:53.835334 kernel: raid6: int64x8 gen() 6273 MB/s Dec 13 14:05:53.856335 kernel: raid6: int64x8 xor() 3541 MB/s Dec 13 14:05:53.876330 kernel: raid6: int64x4 gen() 7202 MB/s Dec 13 14:05:53.896331 kernel: raid6: int64x4 xor() 3856 MB/s Dec 13 14:05:53.917332 kernel: raid6: int64x2 gen() 6147 MB/s Dec 13 14:05:53.937331 kernel: raid6: int64x2 xor() 3317 MB/s Dec 13 14:05:53.957330 kernel: raid6: int64x1 gen() 5041 MB/s Dec 13 14:05:53.983055 kernel: raid6: int64x1 xor() 2645 MB/s Dec 13 14:05:53.983065 kernel: raid6: using algorithm neonx8 gen() 13820 MB/s Dec 13 14:05:53.983073 kernel: raid6: .... xor() 10833 MB/s, rmw enabled Dec 13 14:05:53.987866 kernel: raid6: using neon recovery algorithm Dec 13 14:05:54.011525 kernel: xor: measuring software checksum speed Dec 13 14:05:54.011548 kernel: 8regs : 17220 MB/sec Dec 13 14:05:54.015788 kernel: 32regs : 20691 MB/sec Dec 13 14:05:54.020210 kernel: arm64_neon : 27626 MB/sec Dec 13 14:05:54.020232 kernel: xor: using function: arm64_neon (27626 MB/sec) Dec 13 14:05:54.083338 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Dec 13 14:05:54.094069 systemd[1]: Finished dracut-pre-udev.service. Dec 13 14:05:54.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:54.103000 audit: BPF prog-id=7 op=LOAD Dec 13 14:05:54.103000 audit: BPF prog-id=8 op=LOAD Dec 13 14:05:54.104512 systemd[1]: Starting systemd-udevd.service... Dec 13 14:05:54.122471 systemd-udevd[476]: Using default interface naming scheme 'v252'. Dec 13 14:05:54.129170 systemd[1]: Started systemd-udevd.service. Dec 13 14:05:54.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:54.140227 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 14:05:54.157459 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Dec 13 14:05:54.187528 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 14:05:54.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:54.193651 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:05:54.229284 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:05:54.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:54.290343 kernel: hv_vmbus: Vmbus version:5.3 Dec 13 14:05:54.305397 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 14:05:54.305449 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 14:05:54.329067 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Dec 13 14:05:54.329126 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 14:05:54.329143 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 14:05:54.347050 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/MSFT1000:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Dec 13 14:05:54.347114 kernel: scsi host0: storvsc_host_t Dec 13 14:05:54.352345 kernel: scsi host1: storvsc_host_t Dec 13 14:05:54.363661 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 14:05:54.363711 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 14:05:54.370995 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 14:05:54.398230 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 14:05:54.425115 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 14:05:54.425136 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 14:05:54.435783 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 14:05:54.435897 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 14:05:54.435975 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 14:05:54.436052 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 14:05:54.436140 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 14:05:54.436218 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:54.436227 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 14:05:54.461343 kernel: hv_netvsc 000d3afb-abab-000d-3afb-abab000d3afb eth0: VF slot 1 added Dec 13 14:05:54.469350 kernel: hv_vmbus: registering driver hv_pci Dec 13 14:05:54.478337 kernel: hv_pci 8cdd93aa-ed65-4903-893e-0ad74c060f29: PCI VMBus probing: Using version 0x10004 Dec 13 14:05:54.578790 kernel: hv_pci 8cdd93aa-ed65-4903-893e-0ad74c060f29: PCI host bridge to bus ed65:00 Dec 13 14:05:54.578891 kernel: pci_bus ed65:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Dec 13 14:05:54.578987 kernel: pci_bus ed65:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 14:05:54.579057 kernel: pci ed65:00:02.0: [15b3:1018] type 00 class 0x020000 Dec 13 14:05:54.579145 kernel: pci ed65:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:05:54.579223 kernel: pci ed65:00:02.0: enabling Extended Tags Dec 13 14:05:54.579303 kernel: pci ed65:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ed65:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Dec 13 14:05:54.579427 kernel: pci_bus ed65:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 14:05:54.579502 kernel: pci ed65:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Dec 13 14:05:54.616343 kernel: mlx5_core ed65:00:02.0: firmware version: 16.30.1284 Dec 13 14:05:54.843447 kernel: mlx5_core ed65:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Dec 13 14:05:54.843583 kernel: hv_netvsc 000d3afb-abab-000d-3afb-abab000d3afb eth0: VF registering: eth1 Dec 13 14:05:54.843674 kernel: mlx5_core ed65:00:02.0 eth1: joined to eth0 Dec 13 14:05:54.851336 kernel: mlx5_core ed65:00:02.0 enP60773s1: renamed from eth1 Dec 13 14:05:54.890136 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 14:05:54.931345 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (530) Dec 13 14:05:54.944715 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:05:55.087267 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 14:05:55.102278 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 14:05:55.110351 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 14:05:55.131841 systemd[1]: Starting disk-uuid.service... Dec 13 14:05:55.154417 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:55.163351 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:56.174346 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 14:05:56.174407 disk-uuid[604]: The operation has completed successfully. Dec 13 14:05:56.226124 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 14:05:56.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.226223 systemd[1]: Finished disk-uuid.service. Dec 13 14:05:56.239364 systemd[1]: Starting verity-setup.service... Dec 13 14:05:56.287358 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Dec 13 14:05:56.603352 systemd[1]: Found device dev-mapper-usr.device. Dec 13 14:05:56.609009 systemd[1]: Mounting sysusr-usr.mount... Dec 13 14:05:56.618580 systemd[1]: Finished verity-setup.service. Dec 13 14:05:56.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.673347 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 14:05:56.673614 systemd[1]: Mounted sysusr-usr.mount. Dec 13 14:05:56.677603 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 14:05:56.678400 systemd[1]: Starting ignition-setup.service... Dec 13 14:05:56.685651 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 14:05:56.720863 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:05:56.720912 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:05:56.725524 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:05:56.779199 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 14:05:56.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.788000 audit: BPF prog-id=9 op=LOAD Dec 13 14:05:56.789130 systemd[1]: Starting systemd-networkd.service... Dec 13 14:05:56.804427 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 14:05:56.818285 systemd-networkd[845]: lo: Link UP Dec 13 14:05:56.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.818299 systemd-networkd[845]: lo: Gained carrier Dec 13 14:05:56.818688 systemd-networkd[845]: Enumeration completed Dec 13 14:05:56.819471 systemd-networkd[845]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:05:56.820147 systemd[1]: Started systemd-networkd.service. Dec 13 14:05:56.855000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.824985 systemd[1]: Reached target network.target. Dec 13 14:05:56.865109 iscsid[854]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:05:56.865109 iscsid[854]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Dec 13 14:05:56.865109 iscsid[854]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 14:05:56.865109 iscsid[854]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 14:05:56.865109 iscsid[854]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 14:05:56.865109 iscsid[854]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 14:05:56.865109 iscsid[854]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 14:05:56.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.833769 systemd[1]: Starting iscsiuio.service... Dec 13 14:05:56.844885 systemd[1]: Started iscsiuio.service. Dec 13 14:05:56.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.860355 systemd[1]: Starting iscsid.service... Dec 13 14:05:56.876279 systemd[1]: Started iscsid.service. Dec 13 14:05:56.912569 systemd[1]: Starting dracut-initqueue.service... Dec 13 14:05:56.946812 systemd[1]: Finished dracut-initqueue.service. Dec 13 14:05:56.956120 systemd[1]: Reached target remote-fs-pre.target. Dec 13 14:05:56.964143 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:05:56.972821 systemd[1]: Reached target remote-fs.target. Dec 13 14:05:57.037063 kernel: kauditd_printk_skb: 16 callbacks suppressed Dec 13 14:05:57.037088 kernel: audit: type=1130 audit(1734098757.011:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:57.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:56.986028 systemd[1]: Starting dracut-pre-mount.service... Dec 13 14:05:57.006645 systemd[1]: Finished dracut-pre-mount.service. Dec 13 14:05:57.052334 kernel: mlx5_core ed65:00:02.0 enP60773s1: Link up Dec 13 14:05:57.066237 systemd[1]: Finished ignition-setup.service. Dec 13 14:05:57.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:57.096600 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 14:05:57.118626 kernel: audit: type=1130 audit(1734098757.073:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:05:57.118665 kernel: hv_netvsc 000d3afb-abab-000d-3afb-abab000d3afb eth0: Data path switched to VF: enP60773s1 Dec 13 14:05:57.118818 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:05:57.104076 systemd-networkd[845]: enP60773s1: Link UP Dec 13 14:05:57.104161 systemd-networkd[845]: eth0: Link UP Dec 13 14:05:57.112605 systemd-networkd[845]: eth0: Gained carrier Dec 13 14:05:57.127449 systemd-networkd[845]: enP60773s1: Gained carrier Dec 13 14:05:57.137409 systemd-networkd[845]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:05:58.767694 systemd-networkd[845]: eth0: Gained IPv6LL Dec 13 14:06:00.240966 ignition[869]: Ignition 2.14.0 Dec 13 14:06:00.244222 ignition[869]: Stage: fetch-offline Dec 13 14:06:00.244310 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:00.244348 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:00.295532 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:00.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.326346 kernel: audit: type=1130 audit(1734098760.307:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.295684 ignition[869]: parsed url from cmdline: "" Dec 13 14:06:00.302200 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 14:06:00.295689 ignition[869]: no config URL provided Dec 13 14:06:00.324082 systemd[1]: Starting ignition-fetch.service... Dec 13 14:06:00.295694 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:06:00.295702 ignition[869]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:06:00.295707 ignition[869]: failed to fetch config: resource requires networking Dec 13 14:06:00.295811 ignition[869]: Ignition finished successfully Dec 13 14:06:00.331334 ignition[875]: Ignition 2.14.0 Dec 13 14:06:00.331595 ignition[875]: Stage: fetch Dec 13 14:06:00.331737 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:00.331756 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:00.334630 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:00.335020 ignition[875]: parsed url from cmdline: "" Dec 13 14:06:00.335025 ignition[875]: no config URL provided Dec 13 14:06:00.335032 ignition[875]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 14:06:00.335045 ignition[875]: no config at "/usr/lib/ignition/user.ign" Dec 13 14:06:00.335084 ignition[875]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 14:06:00.436185 ignition[875]: GET result: OK Dec 13 14:06:00.436294 ignition[875]: config has been read from IMDS userdata Dec 13 14:06:00.439378 unknown[875]: fetched base config from "system" Dec 13 14:06:00.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.436373 ignition[875]: parsing config with SHA512: 4af79333e5a8044d73b62051cacfa9ad7808d3e28e0bfd37aaf6d691024b8f71b8f7d6b3e225909acf94021da664f1deb60d0a340a8e509ec3d11eefb167db4c Dec 13 14:06:00.439388 unknown[875]: fetched base config from "system" Dec 13 14:06:00.482827 kernel: audit: type=1130 audit(1734098760.451:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.439941 ignition[875]: fetch: fetch complete Dec 13 14:06:00.439393 unknown[875]: fetched user config from "azure" Dec 13 14:06:00.439950 ignition[875]: fetch: fetch passed Dec 13 14:06:00.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.446028 systemd[1]: Finished ignition-fetch.service. Dec 13 14:06:00.521464 kernel: audit: type=1130 audit(1734098760.499:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.440002 ignition[875]: Ignition finished successfully Dec 13 14:06:00.474014 systemd[1]: Starting ignition-kargs.service... Dec 13 14:06:00.486199 ignition[882]: Ignition 2.14.0 Dec 13 14:06:00.495169 systemd[1]: Finished ignition-kargs.service. Dec 13 14:06:00.486205 ignition[882]: Stage: kargs Dec 13 14:06:00.547000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.521579 systemd[1]: Starting ignition-disks.service... Dec 13 14:06:00.486307 ignition[882]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:00.583741 kernel: audit: type=1130 audit(1734098760.547:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.542929 systemd[1]: Finished ignition-disks.service. Dec 13 14:06:00.486368 ignition[882]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:00.568398 systemd[1]: Reached target initrd-root-device.target. Dec 13 14:06:00.488944 ignition[882]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:00.577569 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:06:00.491215 ignition[882]: kargs: kargs passed Dec 13 14:06:00.588407 systemd[1]: Reached target local-fs.target. Dec 13 14:06:00.491357 ignition[882]: Ignition finished successfully Dec 13 14:06:00.597222 systemd[1]: Reached target sysinit.target. Dec 13 14:06:00.532387 ignition[888]: Ignition 2.14.0 Dec 13 14:06:00.606854 systemd[1]: Reached target basic.target. Dec 13 14:06:00.532393 ignition[888]: Stage: disks Dec 13 14:06:00.621352 systemd[1]: Starting systemd-fsck-root.service... Dec 13 14:06:00.532491 ignition[888]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:00.532513 ignition[888]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:00.536866 ignition[888]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:00.538255 ignition[888]: disks: disks passed Dec 13 14:06:00.538298 ignition[888]: Ignition finished successfully Dec 13 14:06:00.725127 systemd-fsck[896]: ROOT: clean, 621/7326000 files, 481076/7359488 blocks Dec 13 14:06:00.740209 systemd[1]: Finished systemd-fsck-root.service. Dec 13 14:06:00.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.749269 systemd[1]: Mounting sysroot.mount... Dec 13 14:06:00.771364 kernel: audit: type=1130 audit(1734098760.747:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:00.784352 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 14:06:00.785010 systemd[1]: Mounted sysroot.mount. Dec 13 14:06:00.792340 systemd[1]: Reached target initrd-root-fs.target. Dec 13 14:06:00.833112 systemd[1]: Mounting sysroot-usr.mount... Dec 13 14:06:00.837966 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 14:06:00.845147 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 14:06:00.845198 systemd[1]: Reached target ignition-diskful.target. Dec 13 14:06:00.856646 systemd[1]: Mounted sysroot-usr.mount. Dec 13 14:06:00.914822 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:06:00.932372 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (907) Dec 13 14:06:00.932653 systemd[1]: Starting initrd-setup-root.service... Dec 13 14:06:00.959797 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:06:00.959818 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:06:00.959827 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:06:00.962457 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:06:00.972053 initrd-setup-root[912]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 14:06:00.988439 initrd-setup-root[938]: cut: /sysroot/etc/group: No such file or directory Dec 13 14:06:01.013204 initrd-setup-root[946]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 14:06:01.022402 initrd-setup-root[954]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 14:06:01.487836 systemd[1]: Finished initrd-setup-root.service. Dec 13 14:06:01.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.493460 systemd[1]: Starting ignition-mount.service... Dec 13 14:06:01.520296 kernel: audit: type=1130 audit(1734098761.492:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.516772 systemd[1]: Starting sysroot-boot.service... Dec 13 14:06:01.527123 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 14:06:01.527246 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 14:06:01.551585 ignition[973]: INFO : Ignition 2.14.0 Dec 13 14:06:01.556616 ignition[973]: INFO : Stage: mount Dec 13 14:06:01.556616 ignition[973]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:01.556616 ignition[973]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:01.586244 ignition[973]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:01.586244 ignition[973]: INFO : mount: mount passed Dec 13 14:06:01.586244 ignition[973]: INFO : Ignition finished successfully Dec 13 14:06:01.645578 kernel: audit: type=1130 audit(1734098761.590:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.645601 kernel: audit: type=1130 audit(1734098761.620:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.620000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:01.584525 systemd[1]: Finished sysroot-boot.service. Dec 13 14:06:01.613900 systemd[1]: Finished ignition-mount.service. Dec 13 14:06:02.108143 coreos-metadata[906]: Dec 13 14:06:02.108 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 14:06:02.116399 coreos-metadata[906]: Dec 13 14:06:02.111 INFO Fetch successful Dec 13 14:06:02.148443 coreos-metadata[906]: Dec 13 14:06:02.148 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 14:06:02.173921 coreos-metadata[906]: Dec 13 14:06:02.173 INFO Fetch successful Dec 13 14:06:02.191223 coreos-metadata[906]: Dec 13 14:06:02.191 INFO wrote hostname ci-3510.3.6-a-02735da4ec to /sysroot/etc/hostname Dec 13 14:06:02.200789 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 14:06:02.206000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:02.207658 systemd[1]: Starting ignition-files.service... Dec 13 14:06:02.238238 kernel: audit: type=1130 audit(1734098762.206:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:02.237295 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 14:06:02.257452 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (986) Dec 13 14:06:02.269427 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Dec 13 14:06:02.269444 kernel: BTRFS info (device sda6): using free space tree Dec 13 14:06:02.274308 kernel: BTRFS info (device sda6): has skinny extents Dec 13 14:06:02.279105 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 14:06:02.293501 ignition[1005]: INFO : Ignition 2.14.0 Dec 13 14:06:02.293501 ignition[1005]: INFO : Stage: files Dec 13 14:06:02.303461 ignition[1005]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:02.303461 ignition[1005]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:02.303461 ignition[1005]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:02.303461 ignition[1005]: DEBUG : files: compiled without relabeling support, skipping Dec 13 14:06:02.303461 ignition[1005]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 14:06:02.303461 ignition[1005]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 14:06:02.418201 ignition[1005]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 14:06:02.426613 ignition[1005]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 14:06:02.443485 unknown[1005]: wrote ssh authorized keys file for user: core Dec 13 14:06:02.449736 ignition[1005]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 14:06:02.458617 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:06:02.458617 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Dec 13 14:06:02.577873 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 14:06:02.850563 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:06:02.862675 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:06:03.036371 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1005) Dec 13 14:06:02.937082 systemd[1]: mnt-oem1781519521.mount: Deactivated successfully. Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1781519521" Dec 13 14:06:03.042278 ignition[1005]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1781519521": device or resource busy Dec 13 14:06:03.042278 ignition[1005]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1781519521", trying btrfs: device or resource busy Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1781519521" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1781519521" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem1781519521" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem1781519521" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2662588660" Dec 13 14:06:03.042278 ignition[1005]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2662588660": device or resource busy Dec 13 14:06:03.042278 ignition[1005]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2662588660", trying btrfs: device or resource busy Dec 13 14:06:03.042278 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2662588660" Dec 13 14:06:02.972574 systemd[1]: mnt-oem2662588660.mount: Deactivated successfully. Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2662588660" Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem2662588660" Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem2662588660" Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:06:03.209937 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-arm64.raw: attempt #1 Dec 13 14:06:03.501806 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 14:06:03.738035 ignition[1005]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-arm64.raw" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 14:06:03.750350 ignition[1005]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:06:03.825944 kernel: audit: type=1130 audit(1734098763.768:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.759976 systemd[1]: Finished ignition-files.service. Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 14:06:03.834116 ignition[1005]: INFO : files: files passed Dec 13 14:06:03.834116 ignition[1005]: INFO : Ignition finished successfully Dec 13 14:06:04.070103 kernel: audit: type=1130 audit(1734098763.839:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.070133 kernel: audit: type=1130 audit(1734098763.870:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.070144 kernel: audit: type=1131 audit(1734098763.870:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.070153 kernel: audit: type=1130 audit(1734098763.975:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.070164 kernel: audit: type=1131 audit(1734098764.004:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.769811 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 14:06:04.076607 initrd-setup-root-after-ignition[1029]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 14:06:04.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.796556 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 14:06:04.122352 kernel: audit: type=1130 audit(1734098764.081:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.805269 systemd[1]: Starting ignition-quench.service... Dec 13 14:06:03.830296 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 14:06:03.839967 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 14:06:03.840066 systemd[1]: Finished ignition-quench.service. Dec 13 14:06:03.871115 systemd[1]: Reached target ignition-complete.target. Dec 13 14:06:03.928600 systemd[1]: Starting initrd-parse-etc.service... Dec 13 14:06:03.962588 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 14:06:04.175000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:03.962697 systemd[1]: Finished initrd-parse-etc.service. Dec 13 14:06:04.204404 kernel: audit: type=1131 audit(1734098764.175:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.004684 systemd[1]: Reached target initrd-fs.target. Dec 13 14:06:04.035658 systemd[1]: Reached target initrd.target. Dec 13 14:06:04.052378 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 14:06:04.053296 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 14:06:04.072202 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 14:06:04.121668 systemd[1]: Starting initrd-cleanup.service... Dec 13 14:06:04.140052 systemd[1]: Stopped target nss-lookup.target. Dec 13 14:06:04.148178 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 14:06:04.157565 systemd[1]: Stopped target timers.target. Dec 13 14:06:04.166945 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 14:06:04.167005 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 14:06:04.200015 systemd[1]: Stopped target initrd.target. Dec 13 14:06:04.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.208770 systemd[1]: Stopped target basic.target. Dec 13 14:06:04.217019 systemd[1]: Stopped target ignition-complete.target. Dec 13 14:06:04.349153 kernel: audit: type=1131 audit(1734098764.312:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.226363 systemd[1]: Stopped target ignition-diskful.target. Dec 13 14:06:04.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.240088 systemd[1]: Stopped target initrd-root-device.target. Dec 13 14:06:04.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.250101 systemd[1]: Stopped target remote-fs.target. Dec 13 14:06:04.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.259275 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 14:06:04.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.268471 systemd[1]: Stopped target sysinit.target. Dec 13 14:06:04.276979 systemd[1]: Stopped target local-fs.target. Dec 13 14:06:04.286181 systemd[1]: Stopped target local-fs-pre.target. Dec 13 14:06:04.295037 systemd[1]: Stopped target swap.target. Dec 13 14:06:04.417515 ignition[1043]: INFO : Ignition 2.14.0 Dec 13 14:06:04.417515 ignition[1043]: INFO : Stage: umount Dec 13 14:06:04.417515 ignition[1043]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 14:06:04.417515 ignition[1043]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 14:06:04.417515 ignition[1043]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 14:06:04.417515 ignition[1043]: INFO : umount: umount passed Dec 13 14:06:04.417515 ignition[1043]: INFO : Ignition finished successfully Dec 13 14:06:04.418000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.435000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.304559 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 14:06:04.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.304628 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 14:06:04.336248 systemd[1]: Stopped target cryptsetup.target. Dec 13 14:06:04.344472 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 14:06:04.344529 systemd[1]: Stopped dracut-initqueue.service. Dec 13 14:06:04.353657 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 14:06:04.353694 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 14:06:04.363647 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 14:06:04.363687 systemd[1]: Stopped ignition-files.service. Dec 13 14:06:04.576000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.372357 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 14:06:04.372396 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 14:06:04.382228 systemd[1]: Stopping ignition-mount.service... Dec 13 14:06:04.404454 systemd[1]: Stopping sysroot-boot.service... Dec 13 14:06:04.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.412455 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 14:06:04.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.629000 audit: BPF prog-id=6 op=UNLOAD Dec 13 14:06:04.412536 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 14:06:04.418433 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 14:06:04.418481 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 14:06:04.427973 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 14:06:04.657000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.428094 systemd[1]: Finished initrd-cleanup.service. Dec 13 14:06:04.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.435718 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 14:06:04.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.435807 systemd[1]: Stopped ignition-mount.service. Dec 13 14:06:04.440430 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 14:06:04.440485 systemd[1]: Stopped ignition-disks.service. Dec 13 14:06:04.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.452296 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 14:06:04.452355 systemd[1]: Stopped ignition-kargs.service. Dec 13 14:06:04.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.456892 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 14:06:04.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.456934 systemd[1]: Stopped ignition-fetch.service. Dec 13 14:06:04.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.481477 systemd[1]: Stopped target network.target. Dec 13 14:06:04.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.490107 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 14:06:04.490183 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 14:06:04.791101 kernel: hv_netvsc 000d3afb-abab-000d-3afb-abab000d3afb eth0: Data path switched from VF: enP60773s1 Dec 13 14:06:04.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.500424 systemd[1]: Stopped target paths.target. Dec 13 14:06:04.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.510330 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 14:06:04.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.524351 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 14:06:04.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.529678 systemd[1]: Stopped target slices.target. Dec 13 14:06:04.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.538798 systemd[1]: Stopped target sockets.target. Dec 13 14:06:04.543713 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 14:06:04.543752 systemd[1]: Closed iscsid.socket. Dec 13 14:06:04.555735 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 14:06:04.555771 systemd[1]: Closed iscsiuio.socket. Dec 13 14:06:04.566795 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 14:06:04.566841 systemd[1]: Stopped ignition-setup.service. Dec 13 14:06:04.577477 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:06:04.586750 systemd[1]: Stopping systemd-resolved.service... Dec 13 14:06:04.597379 systemd-networkd[845]: eth0: DHCPv6 lease lost Dec 13 14:06:04.868000 audit: BPF prog-id=9 op=UNLOAD Dec 13 14:06:04.599110 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 14:06:04.604560 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:06:04.604662 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:06:04.615549 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 14:06:04.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:04.615673 systemd[1]: Stopped systemd-resolved.service. Dec 13 14:06:04.624310 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 14:06:04.624486 systemd[1]: Closed systemd-networkd.socket. Dec 13 14:06:04.634750 systemd[1]: Stopping network-cleanup.service... Dec 13 14:06:04.648195 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 14:06:04.648288 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 14:06:04.658223 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 14:06:04.956177 iscsid[854]: iscsid shutting down. Dec 13 14:06:04.658277 systemd[1]: Stopped systemd-sysctl.service. Dec 13 14:06:04.956332 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Dec 13 14:06:04.671978 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 14:06:04.672030 systemd[1]: Stopped systemd-modules-load.service. Dec 13 14:06:04.676989 systemd[1]: Stopping systemd-udevd.service... Dec 13 14:06:04.693156 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 14:06:04.693708 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 14:06:04.693831 systemd[1]: Stopped systemd-udevd.service. Dec 13 14:06:04.702738 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 14:06:04.702784 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 14:06:04.710801 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 14:06:04.710839 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 14:06:04.715612 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 14:06:04.715659 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 14:06:04.728096 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 14:06:04.728145 systemd[1]: Stopped dracut-cmdline.service. Dec 13 14:06:04.736984 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 14:06:04.737026 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 14:06:04.747486 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 14:06:04.757817 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Dec 13 14:06:04.757882 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Dec 13 14:06:04.776812 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 14:06:04.776880 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 14:06:04.786597 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 14:06:04.786650 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 14:06:04.796948 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Dec 13 14:06:04.797570 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 14:06:04.797672 systemd[1]: Stopped sysroot-boot.service. Dec 13 14:06:04.804142 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 14:06:04.804277 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 14:06:04.815239 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 14:06:04.815298 systemd[1]: Stopped initrd-setup-root.service. Dec 13 14:06:04.884012 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 14:06:04.884133 systemd[1]: Stopped network-cleanup.service. Dec 13 14:06:04.892652 systemd[1]: Reached target initrd-switch-root.target. Dec 13 14:06:04.904315 systemd[1]: Starting initrd-switch-root.service... Dec 13 14:06:04.927072 systemd[1]: Switching root. Dec 13 14:06:04.957204 systemd-journald[276]: Journal stopped Dec 13 14:06:15.704927 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 14:06:15.704948 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 14:06:15.704960 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 14:06:15.704970 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 14:06:15.704978 kernel: SELinux: policy capability open_perms=1 Dec 13 14:06:15.704986 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 14:06:15.704995 kernel: SELinux: policy capability always_check_network=0 Dec 13 14:06:15.705003 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 14:06:15.705011 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 14:06:15.705019 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 14:06:15.705027 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 14:06:15.705038 systemd[1]: Successfully loaded SELinux policy in 288.622ms. Dec 13 14:06:15.705049 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 25.493ms. Dec 13 14:06:15.705059 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 14:06:15.705071 systemd[1]: Detected virtualization microsoft. Dec 13 14:06:15.705082 systemd[1]: Detected architecture arm64. Dec 13 14:06:15.705091 systemd[1]: Detected first boot. Dec 13 14:06:15.705100 systemd[1]: Hostname set to . Dec 13 14:06:15.705109 systemd[1]: Initializing machine ID from random generator. Dec 13 14:06:15.705118 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:06:15.705127 kernel: audit: type=1400 audit(1734098767.915:81): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:15.705137 kernel: audit: type=1400 audit(1734098767.920:82): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:15.705147 kernel: audit: type=1334 audit(1734098767.938:83): prog-id=10 op=LOAD Dec 13 14:06:15.705156 kernel: audit: type=1334 audit(1734098767.938:84): prog-id=10 op=UNLOAD Dec 13 14:06:15.705165 kernel: audit: type=1334 audit(1734098767.955:85): prog-id=11 op=LOAD Dec 13 14:06:15.705173 kernel: audit: type=1334 audit(1734098767.955:86): prog-id=11 op=UNLOAD Dec 13 14:06:15.705182 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 14:06:15.705192 kernel: audit: type=1400 audit(1734098769.126:87): avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:06:15.705203 kernel: audit: type=1300 audit(1734098769.126:87): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:15.705213 kernel: audit: type=1327 audit(1734098769.126:87): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:06:15.705223 kernel: audit: type=1400 audit(1734098769.146:88): avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:06:15.705232 systemd[1]: Populated /etc with preset unit settings. Dec 13 14:06:15.705242 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:06:15.705251 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:06:15.705262 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:06:15.705274 kernel: kauditd_printk_skb: 5 callbacks suppressed Dec 13 14:06:15.705283 kernel: audit: type=1334 audit(1734098774.846:89): prog-id=12 op=LOAD Dec 13 14:06:15.705291 kernel: audit: type=1334 audit(1734098774.846:90): prog-id=3 op=UNLOAD Dec 13 14:06:15.705299 kernel: audit: type=1334 audit(1734098774.851:91): prog-id=13 op=LOAD Dec 13 14:06:15.705308 kernel: audit: type=1334 audit(1734098774.857:92): prog-id=14 op=LOAD Dec 13 14:06:15.705332 kernel: audit: type=1334 audit(1734098774.857:93): prog-id=4 op=UNLOAD Dec 13 14:06:15.705342 kernel: audit: type=1334 audit(1734098774.857:94): prog-id=5 op=UNLOAD Dec 13 14:06:15.705351 kernel: audit: type=1334 audit(1734098774.863:95): prog-id=15 op=LOAD Dec 13 14:06:15.705360 kernel: audit: type=1334 audit(1734098774.863:96): prog-id=12 op=UNLOAD Dec 13 14:06:15.705370 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 14:06:15.705380 kernel: audit: type=1334 audit(1734098774.869:97): prog-id=16 op=LOAD Dec 13 14:06:15.705389 systemd[1]: Stopped iscsiuio.service. Dec 13 14:06:15.705398 kernel: audit: type=1334 audit(1734098774.874:98): prog-id=17 op=LOAD Dec 13 14:06:15.705407 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 14:06:15.705417 systemd[1]: Stopped iscsid.service. Dec 13 14:06:15.705426 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 14:06:15.705437 systemd[1]: Stopped initrd-switch-root.service. Dec 13 14:06:15.705453 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 14:06:15.705463 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 14:06:15.705473 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 14:06:15.705483 systemd[1]: Created slice system-getty.slice. Dec 13 14:06:15.705493 systemd[1]: Created slice system-modprobe.slice. Dec 13 14:06:15.705503 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 14:06:15.705513 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 14:06:15.705522 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 14:06:15.705533 systemd[1]: Created slice user.slice. Dec 13 14:06:15.705543 systemd[1]: Started systemd-ask-password-console.path. Dec 13 14:06:15.705552 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 14:06:15.705561 systemd[1]: Set up automount boot.automount. Dec 13 14:06:15.705571 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 14:06:15.705580 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 14:06:15.705590 systemd[1]: Stopped target initrd-fs.target. Dec 13 14:06:15.705599 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 14:06:15.705610 systemd[1]: Reached target integritysetup.target. Dec 13 14:06:15.705619 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 14:06:15.705629 systemd[1]: Reached target remote-fs.target. Dec 13 14:06:15.705638 systemd[1]: Reached target slices.target. Dec 13 14:06:15.705647 systemd[1]: Reached target swap.target. Dec 13 14:06:15.705657 systemd[1]: Reached target torcx.target. Dec 13 14:06:15.705668 systemd[1]: Reached target veritysetup.target. Dec 13 14:06:15.705677 systemd[1]: Listening on systemd-coredump.socket. Dec 13 14:06:15.705687 systemd[1]: Listening on systemd-initctl.socket. Dec 13 14:06:15.705697 systemd[1]: Listening on systemd-networkd.socket. Dec 13 14:06:15.705707 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 14:06:15.705717 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 14:06:15.705726 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 14:06:15.705737 systemd[1]: Mounting dev-hugepages.mount... Dec 13 14:06:15.705747 systemd[1]: Mounting dev-mqueue.mount... Dec 13 14:06:15.705757 systemd[1]: Mounting media.mount... Dec 13 14:06:15.705766 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 14:06:15.705776 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 14:06:15.705785 systemd[1]: Mounting tmp.mount... Dec 13 14:06:15.705795 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 14:06:15.705804 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:15.705814 systemd[1]: Starting kmod-static-nodes.service... Dec 13 14:06:15.705825 systemd[1]: Starting modprobe@configfs.service... Dec 13 14:06:15.705835 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:15.705844 systemd[1]: Starting modprobe@drm.service... Dec 13 14:06:15.705854 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:15.705863 systemd[1]: Starting modprobe@fuse.service... Dec 13 14:06:15.705873 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:15.705882 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 14:06:15.705892 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 14:06:15.705902 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 14:06:15.705913 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 14:06:15.705923 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 14:06:15.705932 systemd[1]: Stopped systemd-journald.service. Dec 13 14:06:15.705942 kernel: fuse: init (API version 7.34) Dec 13 14:06:15.705951 systemd[1]: systemd-journald.service: Consumed 3.083s CPU time. Dec 13 14:06:15.705961 systemd[1]: Starting systemd-journald.service... Dec 13 14:06:15.705970 kernel: loop: module loaded Dec 13 14:06:15.705979 systemd[1]: Starting systemd-modules-load.service... Dec 13 14:06:15.705989 systemd[1]: Starting systemd-network-generator.service... Dec 13 14:06:15.706000 systemd[1]: Starting systemd-remount-fs.service... Dec 13 14:06:15.706010 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 14:06:15.706019 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 14:06:15.706029 systemd[1]: Stopped verity-setup.service. Dec 13 14:06:15.706038 systemd[1]: Mounted dev-hugepages.mount. Dec 13 14:06:15.706048 systemd[1]: Mounted dev-mqueue.mount. Dec 13 14:06:15.706057 systemd[1]: Mounted media.mount. Dec 13 14:06:15.706067 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 14:06:15.706076 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 14:06:15.706087 systemd[1]: Mounted tmp.mount. Dec 13 14:06:15.706100 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 14:06:15.706116 systemd-journald[1163]: Journal started Dec 13 14:06:15.706157 systemd-journald[1163]: Runtime Journal (/run/log/journal/0d9ef9bb09c9438cafe1338e1de50286) is 8.0M, max 78.5M, 70.5M free. Dec 13 14:06:07.146000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 14:06:07.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:07.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 14:06:07.938000 audit: BPF prog-id=10 op=LOAD Dec 13 14:06:07.938000 audit: BPF prog-id=10 op=UNLOAD Dec 13 14:06:07.955000 audit: BPF prog-id=11 op=LOAD Dec 13 14:06:07.955000 audit: BPF prog-id=11 op=UNLOAD Dec 13 14:06:09.126000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 14:06:09.126000 audit[1076]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:09.126000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:06:09.146000 audit[1076]: AVC avc: denied { associate } for pid=1076 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 14:06:09.146000 audit[1076]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022105 a2=1ed a3=0 items=2 ppid=1059 pid=1076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:09.146000 audit: CWD cwd="/" Dec 13 14:06:09.146000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:09.146000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:09.146000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 14:06:14.846000 audit: BPF prog-id=12 op=LOAD Dec 13 14:06:14.846000 audit: BPF prog-id=3 op=UNLOAD Dec 13 14:06:14.851000 audit: BPF prog-id=13 op=LOAD Dec 13 14:06:14.857000 audit: BPF prog-id=14 op=LOAD Dec 13 14:06:14.857000 audit: BPF prog-id=4 op=UNLOAD Dec 13 14:06:14.857000 audit: BPF prog-id=5 op=UNLOAD Dec 13 14:06:14.863000 audit: BPF prog-id=15 op=LOAD Dec 13 14:06:14.863000 audit: BPF prog-id=12 op=UNLOAD Dec 13 14:06:14.869000 audit: BPF prog-id=16 op=LOAD Dec 13 14:06:14.874000 audit: BPF prog-id=17 op=LOAD Dec 13 14:06:14.874000 audit: BPF prog-id=13 op=UNLOAD Dec 13 14:06:14.874000 audit: BPF prog-id=14 op=UNLOAD Dec 13 14:06:14.880000 audit: BPF prog-id=18 op=LOAD Dec 13 14:06:14.880000 audit: BPF prog-id=15 op=UNLOAD Dec 13 14:06:14.886000 audit: BPF prog-id=19 op=LOAD Dec 13 14:06:14.892000 audit: BPF prog-id=20 op=LOAD Dec 13 14:06:14.892000 audit: BPF prog-id=16 op=UNLOAD Dec 13 14:06:14.892000 audit: BPF prog-id=17 op=UNLOAD Dec 13 14:06:14.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:14.924000 audit: BPF prog-id=18 op=UNLOAD Dec 13 14:06:14.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:14.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:14.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:14.954000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.549000 audit: BPF prog-id=21 op=LOAD Dec 13 14:06:15.551000 audit: BPF prog-id=22 op=LOAD Dec 13 14:06:15.551000 audit: BPF prog-id=23 op=LOAD Dec 13 14:06:15.551000 audit: BPF prog-id=19 op=UNLOAD Dec 13 14:06:15.551000 audit: BPF prog-id=20 op=UNLOAD Dec 13 14:06:15.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.702000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 14:06:15.702000 audit[1163]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffebcaeac0 a2=4000 a3=1 items=0 ppid=1 pid=1163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:15.702000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 14:06:14.844987 systemd[1]: Queued start job for default target multi-user.target. Dec 13 14:06:09.096457 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:06:14.893278 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 14:06:09.096732 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:06:14.893738 systemd[1]: systemd-journald.service: Consumed 3.083s CPU time. Dec 13 14:06:09.096749 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:06:09.096789 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 14:06:09.096799 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 14:06:09.096827 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 14:06:09.096839 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 14:06:09.097039 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 14:06:09.097072 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 14:06:09.097083 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 14:06:09.110660 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 14:06:09.110698 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 14:06:09.110717 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 14:06:09.110731 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 14:06:09.110748 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 14:06:09.110762 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 14:06:13.913628 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:06:13.913892 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:06:13.913988 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:06:13.914151 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 14:06:13.914205 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 14:06:13.914260 /usr/lib/systemd/system-generators/torcx-generator[1076]: time="2024-12-13T14:06:13Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 14:06:15.723452 systemd[1]: Started systemd-journald.service. Dec 13 14:06:15.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.724443 systemd[1]: Finished kmod-static-nodes.service. Dec 13 14:06:15.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.729508 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 14:06:15.729643 systemd[1]: Finished modprobe@configfs.service. Dec 13 14:06:15.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.733000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.734651 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:15.734802 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:15.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.739814 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:06:15.739992 systemd[1]: Finished modprobe@drm.service. Dec 13 14:06:15.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.745074 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:15.745202 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:15.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.750912 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 14:06:15.751034 systemd[1]: Finished modprobe@fuse.service. Dec 13 14:06:15.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.756426 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:15.756551 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:15.761000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.761876 systemd[1]: Finished systemd-network-generator.service. Dec 13 14:06:15.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.767609 systemd[1]: Finished systemd-remount-fs.service. Dec 13 14:06:15.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.774206 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 14:06:15.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.781211 systemd[1]: Reached target network-pre.target. Dec 13 14:06:15.788349 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 14:06:15.795653 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 14:06:15.800435 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 14:06:15.802017 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 14:06:15.808156 systemd[1]: Starting systemd-journal-flush.service... Dec 13 14:06:15.813122 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:15.814373 systemd[1]: Starting systemd-random-seed.service... Dec 13 14:06:15.818974 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:15.820255 systemd[1]: Starting systemd-sysusers.service... Dec 13 14:06:15.826071 systemd[1]: Starting systemd-udev-settle.service... Dec 13 14:06:15.832854 systemd[1]: Finished systemd-modules-load.service. Dec 13 14:06:15.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.838312 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 14:06:15.843885 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 14:06:15.852073 systemd[1]: Starting systemd-sysctl.service... Dec 13 14:06:15.858733 udevadm[1195]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 14:06:15.864206 systemd[1]: Finished systemd-random-seed.service. Dec 13 14:06:15.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.870241 systemd[1]: Reached target first-boot-complete.target. Dec 13 14:06:15.877122 systemd-journald[1163]: Time spent on flushing to /var/log/journal/0d9ef9bb09c9438cafe1338e1de50286 is 17.213ms for 1112 entries. Dec 13 14:06:15.877122 systemd-journald[1163]: System Journal (/var/log/journal/0d9ef9bb09c9438cafe1338e1de50286) is 8.0M, max 2.6G, 2.6G free. Dec 13 14:06:15.936435 systemd-journald[1163]: Received client request to flush runtime journal. Dec 13 14:06:15.932523 systemd[1]: Finished systemd-sysctl.service. Dec 13 14:06:15.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:15.937874 systemd[1]: Finished systemd-journal-flush.service. Dec 13 14:06:15.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:16.311809 systemd[1]: Finished systemd-sysusers.service. Dec 13 14:06:16.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:16.317914 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 14:06:16.667624 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 14:06:16.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.024514 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 14:06:17.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.030000 audit: BPF prog-id=24 op=LOAD Dec 13 14:06:17.030000 audit: BPF prog-id=25 op=LOAD Dec 13 14:06:17.030000 audit: BPF prog-id=7 op=UNLOAD Dec 13 14:06:17.030000 audit: BPF prog-id=8 op=UNLOAD Dec 13 14:06:17.031553 systemd[1]: Starting systemd-udevd.service... Dec 13 14:06:17.050625 systemd-udevd[1202]: Using default interface naming scheme 'v252'. Dec 13 14:06:17.204657 systemd[1]: Started systemd-udevd.service. Dec 13 14:06:17.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.217000 audit: BPF prog-id=26 op=LOAD Dec 13 14:06:17.219074 systemd[1]: Starting systemd-networkd.service... Dec 13 14:06:17.241368 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Dec 13 14:06:17.292000 audit: BPF prog-id=27 op=LOAD Dec 13 14:06:17.292000 audit: BPF prog-id=28 op=LOAD Dec 13 14:06:17.292000 audit: BPF prog-id=29 op=LOAD Dec 13 14:06:17.293507 systemd[1]: Starting systemd-userdbd.service... Dec 13 14:06:17.302000 audit[1222]: AVC avc: denied { confidentiality } for pid=1222 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 14:06:17.326162 kernel: hv_vmbus: registering driver hv_balloon Dec 13 14:06:17.326237 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 14:06:17.326275 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 14:06:17.326293 kernel: hv_balloon: Memory hot add disabled on ARM64 Dec 13 14:06:17.302000 audit[1222]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaaf2d02da0 a1=aa2c a2=ffff85fa24b0 a3=aaaaf2c59010 items=12 ppid=1202 pid=1222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:17.302000 audit: CWD cwd="/" Dec 13 14:06:17.302000 audit: PATH item=0 name=(null) inode=5767 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=1 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=2 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=3 name=(null) inode=10594 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=4 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=5 name=(null) inode=10595 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=6 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=7 name=(null) inode=10596 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=8 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=9 name=(null) inode=10597 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=10 name=(null) inode=10593 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PATH item=11 name=(null) inode=10598 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:06:17.302000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 14:06:17.341467 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 14:06:17.341542 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 14:06:17.354306 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 14:06:17.354388 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 14:06:17.354404 kernel: hv_vmbus: registering driver hv_utils Dec 13 14:06:17.362984 kernel: Console: switching to colour dummy device 80x25 Dec 13 14:06:17.363099 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 14:06:17.363136 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 14:06:17.363168 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 14:06:17.198304 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 14:06:17.251493 systemd-journald[1163]: Time jumped backwards, rotating. Dec 13 14:06:17.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.233368 systemd[1]: Started systemd-userdbd.service. Dec 13 14:06:17.385407 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1218) Dec 13 14:06:17.405159 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 14:06:17.441705 systemd[1]: Finished systemd-udev-settle.service. Dec 13 14:06:17.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.448096 systemd[1]: Starting lvm2-activation-early.service... Dec 13 14:06:17.595733 systemd-networkd[1223]: lo: Link UP Dec 13 14:06:17.596003 systemd-networkd[1223]: lo: Gained carrier Dec 13 14:06:17.596559 systemd-networkd[1223]: Enumeration completed Dec 13 14:06:17.596746 systemd[1]: Started systemd-networkd.service. Dec 13 14:06:17.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.603032 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:06:17.623642 systemd-networkd[1223]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:06:17.676263 kernel: mlx5_core ed65:00:02.0 enP60773s1: Link up Dec 13 14:06:17.685863 lvm[1279]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:06:17.706962 systemd-networkd[1223]: enP60773s1: Link UP Dec 13 14:06:17.707391 kernel: hv_netvsc 000d3afb-abab-000d-3afb-abab000d3afb eth0: Data path switched to VF: enP60773s1 Dec 13 14:06:17.707053 systemd-networkd[1223]: eth0: Link UP Dec 13 14:06:17.707057 systemd-networkd[1223]: eth0: Gained carrier Dec 13 14:06:17.710540 systemd-networkd[1223]: enP60773s1: Gained carrier Dec 13 14:06:17.712298 systemd[1]: Finished lvm2-activation-early.service. Dec 13 14:06:17.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.717676 systemd[1]: Reached target cryptsetup.target. Dec 13 14:06:17.723469 systemd[1]: Starting lvm2-activation.service... Dec 13 14:06:17.724584 systemd-networkd[1223]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:06:17.728919 lvm[1282]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 14:06:17.754224 systemd[1]: Finished lvm2-activation.service. Dec 13 14:06:17.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:17.758865 systemd[1]: Reached target local-fs-pre.target. Dec 13 14:06:17.763610 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 14:06:17.763643 systemd[1]: Reached target local-fs.target. Dec 13 14:06:17.768076 systemd[1]: Reached target machines.target. Dec 13 14:06:17.773694 systemd[1]: Starting ldconfig.service... Dec 13 14:06:17.777573 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:17.777652 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:17.778913 systemd[1]: Starting systemd-boot-update.service... Dec 13 14:06:17.784489 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 14:06:17.791175 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 14:06:17.797524 systemd[1]: Starting systemd-sysext.service... Dec 13 14:06:17.825374 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1284 (bootctl) Dec 13 14:06:17.826726 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 14:06:18.081267 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 14:06:18.134294 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 14:06:18.135114 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 14:06:18.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.142342 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 14:06:18.142534 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 14:06:18.165714 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 14:06:18.171000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.195242 kernel: loop0: detected capacity change from 0 to 189592 Dec 13 14:06:18.224263 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 14:06:18.239240 kernel: loop1: detected capacity change from 0 to 189592 Dec 13 14:06:18.243343 (sd-sysext)[1297]: Using extensions 'kubernetes'. Dec 13 14:06:18.244562 (sd-sysext)[1297]: Merged extensions into '/usr'. Dec 13 14:06:18.262079 systemd[1]: Mounting usr-share-oem.mount... Dec 13 14:06:18.266358 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.267779 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:18.273391 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:18.279460 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:18.284232 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.284396 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:18.286865 systemd[1]: Mounted usr-share-oem.mount. Dec 13 14:06:18.291619 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:18.291769 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:18.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.301000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.297026 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:18.297240 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:18.302636 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:18.302774 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:18.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.307926 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:18.308040 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.309131 systemd[1]: Finished systemd-sysext.service. Dec 13 14:06:18.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.315836 systemd[1]: Starting ensure-sysext.service... Dec 13 14:06:18.321170 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 14:06:18.331142 systemd[1]: Reloading. Dec 13 14:06:18.335758 systemd-tmpfiles[1304]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 14:06:18.341626 systemd-fsck[1294]: fsck.fat 4.2 (2021-01-31) Dec 13 14:06:18.341626 systemd-fsck[1294]: /dev/sda1: 236 files, 117175/258078 clusters Dec 13 14:06:18.355627 systemd-tmpfiles[1304]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 14:06:18.371970 systemd-tmpfiles[1304]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 14:06:18.392979 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-12-13T14:06:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:06:18.393345 /usr/lib/systemd/system-generators/torcx-generator[1327]: time="2024-12-13T14:06:18Z" level=info msg="torcx already run" Dec 13 14:06:18.479102 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:06:18.479123 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:06:18.495069 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:06:18.559000 audit: BPF prog-id=30 op=LOAD Dec 13 14:06:18.559000 audit: BPF prog-id=26 op=UNLOAD Dec 13 14:06:18.561000 audit: BPF prog-id=31 op=LOAD Dec 13 14:06:18.561000 audit: BPF prog-id=21 op=UNLOAD Dec 13 14:06:18.561000 audit: BPF prog-id=32 op=LOAD Dec 13 14:06:18.561000 audit: BPF prog-id=33 op=LOAD Dec 13 14:06:18.561000 audit: BPF prog-id=22 op=UNLOAD Dec 13 14:06:18.561000 audit: BPF prog-id=23 op=UNLOAD Dec 13 14:06:18.561000 audit: BPF prog-id=34 op=LOAD Dec 13 14:06:18.561000 audit: BPF prog-id=35 op=LOAD Dec 13 14:06:18.561000 audit: BPF prog-id=24 op=UNLOAD Dec 13 14:06:18.561000 audit: BPF prog-id=25 op=UNLOAD Dec 13 14:06:18.563000 audit: BPF prog-id=36 op=LOAD Dec 13 14:06:18.563000 audit: BPF prog-id=27 op=UNLOAD Dec 13 14:06:18.563000 audit: BPF prog-id=37 op=LOAD Dec 13 14:06:18.563000 audit: BPF prog-id=38 op=LOAD Dec 13 14:06:18.563000 audit: BPF prog-id=28 op=UNLOAD Dec 13 14:06:18.563000 audit: BPF prog-id=29 op=UNLOAD Dec 13 14:06:18.565961 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 14:06:18.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.578533 systemd[1]: Mounting boot.mount... Dec 13 14:06:18.585669 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.587338 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:18.593977 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:18.599823 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:18.604057 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.604257 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:18.606993 systemd[1]: Mounted boot.mount. Dec 13 14:06:18.611710 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:18.611863 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:18.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.617937 systemd[1]: Finished systemd-boot-update.service. Dec 13 14:06:18.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.624377 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:18.624515 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:18.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.630341 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:18.630477 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:18.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.635000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.637112 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.638856 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:18.644443 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:18.650169 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:18.654755 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.654905 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:18.655745 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:18.655906 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:18.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.660874 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:18.661000 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:18.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.666509 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:18.666634 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:18.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.671000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.673831 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.675179 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 14:06:18.680620 systemd[1]: Starting modprobe@drm.service... Dec 13 14:06:18.685728 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 14:06:18.691194 systemd[1]: Starting modprobe@loop.service... Dec 13 14:06:18.695299 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.695443 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:18.696483 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 14:06:18.696622 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 14:06:18.701000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.701869 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 14:06:18.702001 systemd[1]: Finished modprobe@drm.service. Dec 13 14:06:18.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.706000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.706784 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 14:06:18.706903 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 14:06:18.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.711000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.712186 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 14:06:18.712544 systemd[1]: Finished modprobe@loop.service. Dec 13 14:06:18.717000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.717990 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 14:06:18.718057 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 14:06:18.719147 systemd[1]: Finished ensure-sysext.service. Dec 13 14:06:18.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.855495 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 14:06:18.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.862339 systemd[1]: Starting audit-rules.service... Dec 13 14:06:18.867563 systemd[1]: Starting clean-ca-certificates.service... Dec 13 14:06:18.871963 systemd-networkd[1223]: eth0: Gained IPv6LL Dec 13 14:06:18.873669 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 14:06:18.880000 audit: BPF prog-id=39 op=LOAD Dec 13 14:06:18.881505 systemd[1]: Starting systemd-resolved.service... Dec 13 14:06:18.886000 audit: BPF prog-id=40 op=LOAD Dec 13 14:06:18.889331 systemd[1]: Starting systemd-timesyncd.service... Dec 13 14:06:18.895067 systemd[1]: Starting systemd-update-utmp.service... Dec 13 14:06:18.900254 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:06:18.905000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.933000 audit[1404]: SYSTEM_BOOT pid=1404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.935417 systemd[1]: Finished systemd-update-utmp.service. Dec 13 14:06:18.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.945606 systemd[1]: Finished clean-ca-certificates.service. Dec 13 14:06:18.950943 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 14:06:18.991610 systemd[1]: Started systemd-timesyncd.service. Dec 13 14:06:18.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:18.996703 systemd[1]: Reached target time-set.target. Dec 13 14:06:19.039842 systemd-resolved[1402]: Positive Trust Anchors: Dec 13 14:06:19.040186 systemd-resolved[1402]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 14:06:19.040345 systemd-resolved[1402]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 14:06:19.043726 systemd-resolved[1402]: Using system hostname 'ci-3510.3.6-a-02735da4ec'. Dec 13 14:06:19.045234 systemd[1]: Started systemd-resolved.service. Dec 13 14:06:19.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:19.050706 systemd[1]: Reached target network.target. Dec 13 14:06:19.055058 systemd[1]: Reached target network-online.target. Dec 13 14:06:19.060985 systemd[1]: Reached target nss-lookup.target. Dec 13 14:06:19.121435 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 14:06:19.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:06:19.220000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 14:06:19.220000 audit[1419]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc62e5200 a2=420 a3=0 items=0 ppid=1398 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:06:19.220000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 14:06:19.235487 augenrules[1419]: No rules Dec 13 14:06:19.236634 systemd[1]: Finished audit-rules.service. Dec 13 14:06:19.326612 systemd-timesyncd[1403]: Contacted time server 206.82.28.3:123 (0.flatcar.pool.ntp.org). Dec 13 14:06:19.326973 systemd-timesyncd[1403]: Initial clock synchronization to Fri 2024-12-13 14:06:19.326257 UTC. Dec 13 14:06:24.669997 ldconfig[1283]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 14:06:24.679546 systemd[1]: Finished ldconfig.service. Dec 13 14:06:24.685861 systemd[1]: Starting systemd-update-done.service... Dec 13 14:06:24.725116 systemd[1]: Finished systemd-update-done.service. Dec 13 14:06:24.730353 systemd[1]: Reached target sysinit.target. Dec 13 14:06:24.734951 systemd[1]: Started motdgen.path. Dec 13 14:06:24.738755 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 14:06:24.745372 systemd[1]: Started logrotate.timer. Dec 13 14:06:24.749807 systemd[1]: Started mdadm.timer. Dec 13 14:06:24.753704 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 14:06:24.758468 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 14:06:24.758506 systemd[1]: Reached target paths.target. Dec 13 14:06:24.762739 systemd[1]: Reached target timers.target. Dec 13 14:06:24.768053 systemd[1]: Listening on dbus.socket. Dec 13 14:06:24.773635 systemd[1]: Starting docker.socket... Dec 13 14:06:24.779607 systemd[1]: Listening on sshd.socket. Dec 13 14:06:24.783870 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:24.784480 systemd[1]: Listening on docker.socket. Dec 13 14:06:24.788777 systemd[1]: Reached target sockets.target. Dec 13 14:06:24.793300 systemd[1]: Reached target basic.target. Dec 13 14:06:24.797824 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:06:24.797857 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 14:06:24.799087 systemd[1]: Starting containerd.service... Dec 13 14:06:24.803959 systemd[1]: Starting dbus.service... Dec 13 14:06:24.808514 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 14:06:24.814486 systemd[1]: Starting extend-filesystems.service... Dec 13 14:06:24.821689 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 14:06:24.822978 systemd[1]: Starting kubelet.service... Dec 13 14:06:24.827910 systemd[1]: Starting motdgen.service... Dec 13 14:06:24.832664 systemd[1]: Started nvidia.service. Dec 13 14:06:24.838437 systemd[1]: Starting prepare-helm.service... Dec 13 14:06:24.843760 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 14:06:24.850149 systemd[1]: Starting sshd-keygen.service... Dec 13 14:06:24.858814 systemd[1]: Starting systemd-logind.service... Dec 13 14:06:24.863698 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 14:06:24.863771 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 14:06:24.864498 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 14:06:24.867066 systemd[1]: Starting update-engine.service... Dec 13 14:06:24.877407 jq[1429]: false Dec 13 14:06:24.874390 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 14:06:24.877868 jq[1447]: true Dec 13 14:06:24.884606 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 14:06:24.885391 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 14:06:24.898941 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 14:06:24.899127 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 14:06:24.909811 extend-filesystems[1430]: Found loop1 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda1 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda2 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda3 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found usr Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda4 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda6 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda7 Dec 13 14:06:24.909811 extend-filesystems[1430]: Found sda9 Dec 13 14:06:24.909811 extend-filesystems[1430]: Checking size of /dev/sda9 Dec 13 14:06:25.001303 jq[1452]: true Dec 13 14:06:24.969129 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 14:06:24.969344 systemd[1]: Finished motdgen.service. Dec 13 14:06:24.980114 systemd-logind[1444]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Dec 13 14:06:24.980522 systemd-logind[1444]: New seat seat0. Dec 13 14:06:25.044589 env[1454]: time="2024-12-13T14:06:25.044530857Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 14:06:25.060313 extend-filesystems[1430]: Old size kept for /dev/sda9 Dec 13 14:06:25.092344 extend-filesystems[1430]: Found sr0 Dec 13 14:06:25.073574 dbus-daemon[1428]: [system] SELinux support is enabled Dec 13 14:06:25.067239 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 14:06:25.130292 bash[1481]: Updated "/home/core/.ssh/authorized_keys" Dec 13 14:06:25.130359 tar[1450]: linux-arm64/helm Dec 13 14:06:25.083821 dbus-daemon[1428]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 14:06:25.067415 systemd[1]: Finished extend-filesystems.service. Dec 13 14:06:25.075790 systemd[1]: Started dbus.service. Dec 13 14:06:25.083255 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 14:06:25.083276 systemd[1]: Reached target system-config.target. Dec 13 14:06:25.093482 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 14:06:25.093502 systemd[1]: Reached target user-config.target. Dec 13 14:06:25.102731 systemd[1]: Started systemd-logind.service. Dec 13 14:06:25.122146 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 14:06:25.149286 env[1454]: time="2024-12-13T14:06:25.149233799Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 14:06:25.149410 env[1454]: time="2024-12-13T14:06:25.149393918Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158437 env[1454]: time="2024-12-13T14:06:25.158377278Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158437 env[1454]: time="2024-12-13T14:06:25.158428117Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158703 env[1454]: time="2024-12-13T14:06:25.158674995Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158703 env[1454]: time="2024-12-13T14:06:25.158699795Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158771 env[1454]: time="2024-12-13T14:06:25.158717315Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 14:06:25.158771 env[1454]: time="2024-12-13T14:06:25.158728354Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.158850 env[1454]: time="2024-12-13T14:06:25.158828234Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.159091 env[1454]: time="2024-12-13T14:06:25.159064711Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 14:06:25.159246 env[1454]: time="2024-12-13T14:06:25.159221630Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 14:06:25.159246 env[1454]: time="2024-12-13T14:06:25.159245350Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 14:06:25.159323 env[1454]: time="2024-12-13T14:06:25.159302149Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 14:06:25.159323 env[1454]: time="2024-12-13T14:06:25.159320349Z" level=info msg="metadata content store policy set" policy=shared Dec 13 14:06:25.169532 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 14:06:25.176472 env[1454]: time="2024-12-13T14:06:25.176430796Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 14:06:25.176580 env[1454]: time="2024-12-13T14:06:25.176494035Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 14:06:25.176580 env[1454]: time="2024-12-13T14:06:25.176509995Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 14:06:25.176580 env[1454]: time="2024-12-13T14:06:25.176555355Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.176580 env[1454]: time="2024-12-13T14:06:25.176574715Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.176667 env[1454]: time="2024-12-13T14:06:25.176590354Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.176667 env[1454]: time="2024-12-13T14:06:25.176604994Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.177035 env[1454]: time="2024-12-13T14:06:25.177001391Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.177074 env[1454]: time="2024-12-13T14:06:25.177035270Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.177074 env[1454]: time="2024-12-13T14:06:25.177050150Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.177074 env[1454]: time="2024-12-13T14:06:25.177063150Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.177135 env[1454]: time="2024-12-13T14:06:25.177076190Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 14:06:25.177282 env[1454]: time="2024-12-13T14:06:25.177260788Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 14:06:25.177400 env[1454]: time="2024-12-13T14:06:25.177364627Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181611229Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181665549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181680469Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181738588Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181754028Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181766348Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181778788Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181791068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181804068Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181815268Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181827148Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181842267Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.181988706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.182004826Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.182875 env[1454]: time="2024-12-13T14:06:25.182016906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.183243 env[1454]: time="2024-12-13T14:06:25.182029066Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 14:06:25.183243 env[1454]: time="2024-12-13T14:06:25.182043466Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 14:06:25.183243 env[1454]: time="2024-12-13T14:06:25.182056145Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 14:06:25.183243 env[1454]: time="2024-12-13T14:06:25.182073745Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 14:06:25.183243 env[1454]: time="2024-12-13T14:06:25.182108665Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 14:06:25.183343 env[1454]: time="2024-12-13T14:06:25.182360863Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 14:06:25.183343 env[1454]: time="2024-12-13T14:06:25.182417742Z" level=info msg="Connect containerd service" Dec 13 14:06:25.183343 env[1454]: time="2024-12-13T14:06:25.182449542Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188173011Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188330929Z" level=info msg="Start subscribing containerd event" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188383809Z" level=info msg="Start recovering state" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188457968Z" level=info msg="Start event monitor" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188468368Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188480328Z" level=info msg="Start snapshots syncer" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188491488Z" level=info msg="Start cni network conf syncer for default" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188498888Z" level=info msg="Start streaming server" Dec 13 14:06:25.201110 env[1454]: time="2024-12-13T14:06:25.188508168Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 14:06:25.188632 systemd[1]: Started containerd.service. Dec 13 14:06:25.203474 env[1454]: time="2024-12-13T14:06:25.203408594Z" level=info msg="containerd successfully booted in 0.160209s" Dec 13 14:06:25.561883 update_engine[1445]: I1213 14:06:25.547700 1445 main.cc:92] Flatcar Update Engine starting Dec 13 14:06:25.608547 systemd[1]: Started update-engine.service. Dec 13 14:06:25.615112 update_engine[1445]: I1213 14:06:25.608597 1445 update_check_scheduler.cc:74] Next update check in 2m52s Dec 13 14:06:25.617530 systemd[1]: Started locksmithd.service. Dec 13 14:06:25.841448 systemd[1]: Started kubelet.service. Dec 13 14:06:25.901985 tar[1450]: linux-arm64/LICENSE Dec 13 14:06:25.902090 tar[1450]: linux-arm64/README.md Dec 13 14:06:25.906438 systemd[1]: Finished prepare-helm.service. Dec 13 14:06:26.272382 kubelet[1535]: E1213 14:06:26.272293 1535 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:26.274243 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:26.274362 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:27.063777 locksmithd[1532]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 14:06:27.832204 sshd_keygen[1446]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 14:06:27.849828 systemd[1]: Finished sshd-keygen.service. Dec 13 14:06:27.856772 systemd[1]: Starting issuegen.service... Dec 13 14:06:27.862436 systemd[1]: Started waagent.service. Dec 13 14:06:27.867769 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 14:06:27.867961 systemd[1]: Finished issuegen.service. Dec 13 14:06:27.875188 systemd[1]: Starting systemd-user-sessions.service... Dec 13 14:06:27.897305 systemd[1]: Finished systemd-user-sessions.service. Dec 13 14:06:27.905123 systemd[1]: Started getty@tty1.service. Dec 13 14:06:27.911664 systemd[1]: Started serial-getty@ttyAMA0.service. Dec 13 14:06:27.917747 systemd[1]: Reached target getty.target. Dec 13 14:06:27.922716 systemd[1]: Reached target multi-user.target. Dec 13 14:06:27.929561 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 14:06:27.938770 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 14:06:27.938950 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 14:06:27.945230 systemd[1]: Startup finished in 756ms (kernel) + 14.029s (initrd) + 21.455s (userspace) = 36.242s. Dec 13 14:06:28.474265 login[1561]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 14:06:28.488920 login[1560]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:06:28.542920 systemd[1]: Created slice user-500.slice. Dec 13 14:06:28.544082 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 14:06:28.546651 systemd-logind[1444]: New session 2 of user core. Dec 13 14:06:28.580763 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 14:06:28.582398 systemd[1]: Starting user@500.service... Dec 13 14:06:28.614074 (systemd)[1564]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:06:28.869918 systemd[1564]: Queued start job for default target default.target. Dec 13 14:06:28.870489 systemd[1564]: Reached target paths.target. Dec 13 14:06:28.870510 systemd[1564]: Reached target sockets.target. Dec 13 14:06:28.870522 systemd[1564]: Reached target timers.target. Dec 13 14:06:28.870532 systemd[1564]: Reached target basic.target. Dec 13 14:06:28.870632 systemd[1]: Started user@500.service. Dec 13 14:06:28.871553 systemd[1]: Started session-2.scope. Dec 13 14:06:28.871991 systemd[1564]: Reached target default.target. Dec 13 14:06:28.872149 systemd[1564]: Startup finished in 251ms. Dec 13 14:06:29.475790 login[1561]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 14:06:29.479702 systemd-logind[1444]: New session 1 of user core. Dec 13 14:06:29.480100 systemd[1]: Started session-1.scope. Dec 13 14:06:34.129026 waagent[1558]: 2024-12-13T14:06:34.128906Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 14:06:34.136644 waagent[1558]: 2024-12-13T14:06:34.136548Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 14:06:34.142117 waagent[1558]: 2024-12-13T14:06:34.142038Z INFO Daemon Daemon Python: 3.9.16 Dec 13 14:06:34.147879 waagent[1558]: 2024-12-13T14:06:34.147787Z INFO Daemon Daemon Run daemon Dec 13 14:06:34.152978 waagent[1558]: 2024-12-13T14:06:34.152909Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 14:06:34.179377 waagent[1558]: 2024-12-13T14:06:34.173296Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:06:34.193381 waagent[1558]: 2024-12-13T14:06:34.193158Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:06:34.205079 waagent[1558]: 2024-12-13T14:06:34.204971Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:06:34.210783 waagent[1558]: 2024-12-13T14:06:34.210697Z INFO Daemon Daemon Using waagent for provisioning Dec 13 14:06:34.217187 waagent[1558]: 2024-12-13T14:06:34.217110Z INFO Daemon Daemon Activate resource disk Dec 13 14:06:34.223046 waagent[1558]: 2024-12-13T14:06:34.222970Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 14:06:34.239053 waagent[1558]: 2024-12-13T14:06:34.238966Z INFO Daemon Daemon Found device: None Dec 13 14:06:34.244729 waagent[1558]: 2024-12-13T14:06:34.244649Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 14:06:34.254367 waagent[1558]: 2024-12-13T14:06:34.254287Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 14:06:34.268320 waagent[1558]: 2024-12-13T14:06:34.268247Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:06:34.275345 waagent[1558]: 2024-12-13T14:06:34.275268Z INFO Daemon Daemon Running default provisioning handler Dec 13 14:06:34.290191 waagent[1558]: 2024-12-13T14:06:34.290022Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 14:06:34.308058 waagent[1558]: 2024-12-13T14:06:34.307904Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 14:06:34.319689 waagent[1558]: 2024-12-13T14:06:34.319599Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 14:06:34.325663 waagent[1558]: 2024-12-13T14:06:34.325581Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 14:06:34.411888 waagent[1558]: 2024-12-13T14:06:34.411669Z INFO Daemon Daemon Successfully mounted dvd Dec 13 14:06:34.454359 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 14:06:34.487993 waagent[1558]: 2024-12-13T14:06:34.487852Z INFO Daemon Daemon Detect protocol endpoint Dec 13 14:06:34.494322 waagent[1558]: 2024-12-13T14:06:34.494226Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 14:06:34.501493 waagent[1558]: 2024-12-13T14:06:34.501402Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 14:06:34.509336 waagent[1558]: 2024-12-13T14:06:34.509250Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 14:06:34.515837 waagent[1558]: 2024-12-13T14:06:34.515755Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 14:06:34.521872 waagent[1558]: 2024-12-13T14:06:34.521794Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 14:06:34.618866 waagent[1558]: 2024-12-13T14:06:34.618789Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 14:06:34.627131 waagent[1558]: 2024-12-13T14:06:34.627084Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 14:06:34.633553 waagent[1558]: 2024-12-13T14:06:34.633473Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 14:06:35.769131 waagent[1558]: 2024-12-13T14:06:35.768964Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 14:06:35.785670 waagent[1558]: 2024-12-13T14:06:35.785589Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 14:06:35.791746 waagent[1558]: 2024-12-13T14:06:35.791667Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 14:06:35.887568 waagent[1558]: 2024-12-13T14:06:35.887425Z INFO Daemon Daemon Found private key matching thumbprint 28E59C9876166B2268B20214BFF12851A71E8355 Dec 13 14:06:35.896520 waagent[1558]: 2024-12-13T14:06:35.896429Z INFO Daemon Daemon Certificate with thumbprint 22191FE1829988F28790381528FDB13818DBFC7C has no matching private key. Dec 13 14:06:35.906581 waagent[1558]: 2024-12-13T14:06:35.906497Z INFO Daemon Daemon Fetch goal state completed Dec 13 14:06:35.981206 waagent[1558]: 2024-12-13T14:06:35.981137Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: ed92e6eb-3e49-4881-8e92-65392120eff7 New eTag: 8764377010131528511] Dec 13 14:06:35.993080 waagent[1558]: 2024-12-13T14:06:35.992990Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:06:36.010596 waagent[1558]: 2024-12-13T14:06:36.010507Z INFO Daemon Daemon Starting provisioning Dec 13 14:06:36.017350 waagent[1558]: 2024-12-13T14:06:36.017262Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 14:06:36.023170 waagent[1558]: 2024-12-13T14:06:36.023053Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-02735da4ec] Dec 13 14:06:36.066009 waagent[1558]: 2024-12-13T14:06:36.065858Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-02735da4ec] Dec 13 14:06:36.073365 waagent[1558]: 2024-12-13T14:06:36.073271Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 14:06:36.080299 waagent[1558]: 2024-12-13T14:06:36.080219Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 14:06:36.097632 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 14:06:36.097818 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 14:06:36.097878 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 14:06:36.098142 systemd[1]: Stopping systemd-networkd.service... Dec 13 14:06:36.111262 systemd-networkd[1223]: eth0: DHCPv6 lease lost Dec 13 14:06:36.112667 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 14:06:36.112846 systemd[1]: Stopped systemd-networkd.service. Dec 13 14:06:36.114937 systemd[1]: Starting systemd-networkd.service... Dec 13 14:06:36.143540 systemd-networkd[1609]: enP60773s1: Link UP Dec 13 14:06:36.143552 systemd-networkd[1609]: enP60773s1: Gained carrier Dec 13 14:06:36.144524 systemd-networkd[1609]: eth0: Link UP Dec 13 14:06:36.144535 systemd-networkd[1609]: eth0: Gained carrier Dec 13 14:06:36.144857 systemd-networkd[1609]: lo: Link UP Dec 13 14:06:36.144866 systemd-networkd[1609]: lo: Gained carrier Dec 13 14:06:36.145093 systemd-networkd[1609]: eth0: Gained IPv6LL Dec 13 14:06:36.146501 systemd-networkd[1609]: Enumeration completed Dec 13 14:06:36.146665 systemd[1]: Started systemd-networkd.service. Dec 13 14:06:36.148337 systemd-networkd[1609]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 14:06:36.148471 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 14:06:36.152407 waagent[1558]: 2024-12-13T14:06:36.152252Z INFO Daemon Daemon Create user account if not exists Dec 13 14:06:36.158744 waagent[1558]: 2024-12-13T14:06:36.158656Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 14:06:36.165376 waagent[1558]: 2024-12-13T14:06:36.165282Z INFO Daemon Daemon Configure sudoer Dec 13 14:06:36.170822 waagent[1558]: 2024-12-13T14:06:36.170733Z INFO Daemon Daemon Configure sshd Dec 13 14:06:36.175548 waagent[1558]: 2024-12-13T14:06:36.175461Z INFO Daemon Daemon Deploy ssh public key. Dec 13 14:06:36.176276 systemd-networkd[1609]: eth0: DHCPv4 address 10.200.20.33/24, gateway 10.200.20.1 acquired from 168.63.129.16 Dec 13 14:06:36.187260 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 14:06:36.525125 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 14:06:36.525305 systemd[1]: Stopped kubelet.service. Dec 13 14:06:36.526698 systemd[1]: Starting kubelet.service... Dec 13 14:06:36.609976 systemd[1]: Started kubelet.service. Dec 13 14:06:36.672133 kubelet[1622]: E1213 14:06:36.672049 1622 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:36.674967 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:36.675088 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:37.354237 waagent[1558]: 2024-12-13T14:06:37.350376Z INFO Daemon Daemon Provisioning complete Dec 13 14:06:37.376485 waagent[1558]: 2024-12-13T14:06:37.376420Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 14:06:37.383233 waagent[1558]: 2024-12-13T14:06:37.383136Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 14:06:37.394732 waagent[1558]: 2024-12-13T14:06:37.394649Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 14:06:37.703983 waagent[1627]: 2024-12-13T14:06:37.703826Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 14:06:37.705158 waagent[1627]: 2024-12-13T14:06:37.705092Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:37.705443 waagent[1627]: 2024-12-13T14:06:37.705392Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:37.719122 waagent[1627]: 2024-12-13T14:06:37.719013Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 14:06:37.719540 waagent[1627]: 2024-12-13T14:06:37.719484Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 14:06:37.791986 waagent[1627]: 2024-12-13T14:06:37.791849Z INFO ExtHandler ExtHandler Found private key matching thumbprint 28E59C9876166B2268B20214BFF12851A71E8355 Dec 13 14:06:37.792432 waagent[1627]: 2024-12-13T14:06:37.792375Z INFO ExtHandler ExtHandler Certificate with thumbprint 22191FE1829988F28790381528FDB13818DBFC7C has no matching private key. Dec 13 14:06:37.792813 waagent[1627]: 2024-12-13T14:06:37.792731Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 14:06:37.806911 waagent[1627]: 2024-12-13T14:06:37.806854Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 3295f59a-6ba0-4dc7-913d-7a41ef02edce New eTag: 8764377010131528511] Dec 13 14:06:37.807662 waagent[1627]: 2024-12-13T14:06:37.807604Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 14:06:37.897450 waagent[1627]: 2024-12-13T14:06:37.897300Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:06:37.908263 waagent[1627]: 2024-12-13T14:06:37.908154Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1627 Dec 13 14:06:37.912296 waagent[1627]: 2024-12-13T14:06:37.912218Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:06:37.913811 waagent[1627]: 2024-12-13T14:06:37.913749Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:06:38.012054 waagent[1627]: 2024-12-13T14:06:38.011939Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:06:38.012703 waagent[1627]: 2024-12-13T14:06:38.012640Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:06:38.021549 waagent[1627]: 2024-12-13T14:06:38.021489Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:06:38.022344 waagent[1627]: 2024-12-13T14:06:38.022280Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:06:38.023686 waagent[1627]: 2024-12-13T14:06:38.023621Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 14:06:38.025274 waagent[1627]: 2024-12-13T14:06:38.025176Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:06:38.025524 waagent[1627]: 2024-12-13T14:06:38.025454Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:38.026114 waagent[1627]: 2024-12-13T14:06:38.026035Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:38.026838 waagent[1627]: 2024-12-13T14:06:38.026766Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:06:38.027193 waagent[1627]: 2024-12-13T14:06:38.027131Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:06:38.027193 waagent[1627]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:06:38.027193 waagent[1627]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:06:38.027193 waagent[1627]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:06:38.027193 waagent[1627]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:38.027193 waagent[1627]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:38.027193 waagent[1627]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:38.029673 waagent[1627]: 2024-12-13T14:06:38.029488Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:06:38.030581 waagent[1627]: 2024-12-13T14:06:38.030503Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:38.030774 waagent[1627]: 2024-12-13T14:06:38.030715Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:38.031407 waagent[1627]: 2024-12-13T14:06:38.031336Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:06:38.031629 waagent[1627]: 2024-12-13T14:06:38.031561Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:06:38.031876 waagent[1627]: 2024-12-13T14:06:38.031807Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:06:38.031967 waagent[1627]: 2024-12-13T14:06:38.031909Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:06:38.032274 waagent[1627]: 2024-12-13T14:06:38.032192Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:06:38.033292 waagent[1627]: 2024-12-13T14:06:38.033064Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:06:38.033873 waagent[1627]: 2024-12-13T14:06:38.033791Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:06:38.035941 waagent[1627]: 2024-12-13T14:06:38.035862Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:06:38.047796 waagent[1627]: 2024-12-13T14:06:38.047729Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 14:06:38.048646 waagent[1627]: 2024-12-13T14:06:38.048598Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:06:38.049724 waagent[1627]: 2024-12-13T14:06:38.049670Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 14:06:38.073686 waagent[1627]: 2024-12-13T14:06:38.073521Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1609' Dec 13 14:06:38.126462 waagent[1627]: 2024-12-13T14:06:38.126393Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 14:06:38.179070 waagent[1627]: 2024-12-13T14:06:38.178904Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:06:38.179070 waagent[1627]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:06:38.179070 waagent[1627]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:06:38.179070 waagent[1627]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:ab:ab brd ff:ff:ff:ff:ff:ff Dec 13 14:06:38.179070 waagent[1627]: 3: enP60773s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:ab:ab brd ff:ff:ff:ff:ff:ff\ altname enP60773p0s2 Dec 13 14:06:38.179070 waagent[1627]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:06:38.179070 waagent[1627]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:06:38.179070 waagent[1627]: 2: eth0 inet 10.200.20.33/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:06:38.179070 waagent[1627]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:06:38.179070 waagent[1627]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:06:38.179070 waagent[1627]: 2: eth0 inet6 fe80::20d:3aff:fefb:abab/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:06:38.468318 waagent[1627]: 2024-12-13T14:06:38.468036Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Dec 13 14:06:38.471749 waagent[1627]: 2024-12-13T14:06:38.471616Z INFO EnvHandler ExtHandler Firewall rules: Dec 13 14:06:38.471749 waagent[1627]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:38.471749 waagent[1627]: pkts bytes target prot opt in out source destination Dec 13 14:06:38.471749 waagent[1627]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:38.471749 waagent[1627]: pkts bytes target prot opt in out source destination Dec 13 14:06:38.471749 waagent[1627]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:38.471749 waagent[1627]: pkts bytes target prot opt in out source destination Dec 13 14:06:38.471749 waagent[1627]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:06:38.471749 waagent[1627]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:06:38.473648 waagent[1627]: 2024-12-13T14:06:38.473596Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 14:06:38.527934 waagent[1627]: 2024-12-13T14:06:38.527864Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 14:06:39.398599 waagent[1558]: 2024-12-13T14:06:39.398466Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 14:06:39.405005 waagent[1558]: 2024-12-13T14:06:39.404945Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 14:06:40.677268 waagent[1667]: 2024-12-13T14:06:40.677146Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 14:06:40.679871 waagent[1667]: 2024-12-13T14:06:40.679794Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 14:06:40.680159 waagent[1667]: 2024-12-13T14:06:40.680109Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 14:06:40.680407 waagent[1667]: 2024-12-13T14:06:40.680357Z INFO ExtHandler ExtHandler CPU Arch: aarch64 Dec 13 14:06:40.689442 waagent[1667]: 2024-12-13T14:06:40.689295Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: aarch64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 14:06:40.690073 waagent[1667]: 2024-12-13T14:06:40.690015Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:40.690366 waagent[1667]: 2024-12-13T14:06:40.690314Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:40.705134 waagent[1667]: 2024-12-13T14:06:40.705029Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 14:06:40.719562 waagent[1667]: 2024-12-13T14:06:40.719495Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 14:06:40.720910 waagent[1667]: 2024-12-13T14:06:40.720847Z INFO ExtHandler Dec 13 14:06:40.721229 waagent[1667]: 2024-12-13T14:06:40.721162Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: e952280c-3f67-4671-9dc9-70fef345cd47 eTag: 8764377010131528511 source: Fabric] Dec 13 14:06:40.722129 waagent[1667]: 2024-12-13T14:06:40.722074Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 14:06:40.723573 waagent[1667]: 2024-12-13T14:06:40.723513Z INFO ExtHandler Dec 13 14:06:40.723804 waagent[1667]: 2024-12-13T14:06:40.723756Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 14:06:40.731281 waagent[1667]: 2024-12-13T14:06:40.731212Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 14:06:40.731970 waagent[1667]: 2024-12-13T14:06:40.731923Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 14:06:40.755449 waagent[1667]: 2024-12-13T14:06:40.755377Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 14:06:40.848941 waagent[1667]: 2024-12-13T14:06:40.848791Z INFO ExtHandler Downloaded certificate {'thumbprint': '28E59C9876166B2268B20214BFF12851A71E8355', 'hasPrivateKey': True} Dec 13 14:06:40.853613 waagent[1667]: 2024-12-13T14:06:40.853530Z INFO ExtHandler Downloaded certificate {'thumbprint': '22191FE1829988F28790381528FDB13818DBFC7C', 'hasPrivateKey': False} Dec 13 14:06:40.854913 waagent[1667]: 2024-12-13T14:06:40.854846Z INFO ExtHandler Fetch goal state completed Dec 13 14:06:40.878588 waagent[1667]: 2024-12-13T14:06:40.878469Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 14:06:40.892305 waagent[1667]: 2024-12-13T14:06:40.892159Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1667 Dec 13 14:06:40.895943 waagent[1667]: 2024-12-13T14:06:40.895862Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 14:06:40.897268 waagent[1667]: 2024-12-13T14:06:40.897193Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 14:06:40.897693 waagent[1667]: 2024-12-13T14:06:40.897641Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 14:06:40.900056 waagent[1667]: 2024-12-13T14:06:40.899997Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 14:06:40.905874 waagent[1667]: 2024-12-13T14:06:40.905818Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 14:06:40.906489 waagent[1667]: 2024-12-13T14:06:40.906429Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 14:06:40.915323 waagent[1667]: 2024-12-13T14:06:40.915262Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 14:06:40.916069 waagent[1667]: 2024-12-13T14:06:40.916015Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 14:06:40.958444 waagent[1667]: 2024-12-13T14:06:40.958257Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Dec 13 14:06:40.962074 waagent[1667]: 2024-12-13T14:06:40.961946Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Dec 13 14:06:40.963631 waagent[1667]: 2024-12-13T14:06:40.963549Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 14:06:40.965611 waagent[1667]: 2024-12-13T14:06:40.965535Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 14:06:40.965917 waagent[1667]: 2024-12-13T14:06:40.965831Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:40.966450 waagent[1667]: 2024-12-13T14:06:40.966373Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:40.967140 waagent[1667]: 2024-12-13T14:06:40.967067Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 14:06:40.967737 waagent[1667]: 2024-12-13T14:06:40.967671Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 14:06:40.968453 waagent[1667]: 2024-12-13T14:06:40.968371Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 14:06:40.968453 waagent[1667]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 14:06:40.968453 waagent[1667]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 14:06:40.968453 waagent[1667]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 14:06:40.968453 waagent[1667]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:40.968453 waagent[1667]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:40.968453 waagent[1667]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 14:06:40.968976 waagent[1667]: 2024-12-13T14:06:40.968889Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 14:06:40.969124 waagent[1667]: 2024-12-13T14:06:40.969056Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 14:06:40.969670 waagent[1667]: 2024-12-13T14:06:40.969592Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 14:06:40.972863 waagent[1667]: 2024-12-13T14:06:40.972708Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 14:06:40.973340 waagent[1667]: 2024-12-13T14:06:40.973269Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 14:06:40.973623 waagent[1667]: 2024-12-13T14:06:40.973553Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 14:06:40.974790 waagent[1667]: 2024-12-13T14:06:40.974716Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 14:06:40.978458 waagent[1667]: 2024-12-13T14:06:40.978383Z INFO EnvHandler ExtHandler Configure routes Dec 13 14:06:40.984385 waagent[1667]: 2024-12-13T14:06:40.984307Z INFO EnvHandler ExtHandler Gateway:None Dec 13 14:06:40.985041 waagent[1667]: 2024-12-13T14:06:40.984927Z INFO EnvHandler ExtHandler Routes:None Dec 13 14:06:40.986850 waagent[1667]: 2024-12-13T14:06:40.986771Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 14:06:40.994553 waagent[1667]: 2024-12-13T14:06:40.994472Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 14:06:40.994553 waagent[1667]: Executing ['ip', '-a', '-o', 'link']: Dec 13 14:06:40.994553 waagent[1667]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 14:06:40.994553 waagent[1667]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:ab:ab brd ff:ff:ff:ff:ff:ff Dec 13 14:06:40.994553 waagent[1667]: 3: enP60773s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fb:ab:ab brd ff:ff:ff:ff:ff:ff\ altname enP60773p0s2 Dec 13 14:06:40.994553 waagent[1667]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 14:06:40.994553 waagent[1667]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 14:06:40.994553 waagent[1667]: 2: eth0 inet 10.200.20.33/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 14:06:40.994553 waagent[1667]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 14:06:40.994553 waagent[1667]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 14:06:40.994553 waagent[1667]: 2: eth0 inet6 fe80::20d:3aff:fefb:abab/64 scope link \ valid_lft forever preferred_lft forever Dec 13 14:06:41.011019 waagent[1667]: 2024-12-13T14:06:41.010909Z INFO ExtHandler ExtHandler Dec 13 14:06:41.012246 waagent[1667]: 2024-12-13T14:06:41.012147Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 97498eac-11a8-4e63-9096-43b8414c0eec correlation 0db242f6-bbcd-4c36-8a20-8bb38f8b61ff created: 2024-12-13T14:05:07.868401Z] Dec 13 14:06:41.015848 waagent[1667]: 2024-12-13T14:06:41.015763Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 14:06:41.020154 waagent[1667]: 2024-12-13T14:06:41.020059Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 9 ms] Dec 13 14:06:41.064410 waagent[1667]: 2024-12-13T14:06:41.064322Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 14:06:41.091904 waagent[1667]: 2024-12-13T14:06:41.091816Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: A8401BDD-E435-4AA3-B033-CAE8D84071A2;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 14:06:41.096498 waagent[1667]: 2024-12-13T14:06:41.096351Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 14:06:41.096498 waagent[1667]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:41.096498 waagent[1667]: pkts bytes target prot opt in out source destination Dec 13 14:06:41.096498 waagent[1667]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:41.096498 waagent[1667]: pkts bytes target prot opt in out source destination Dec 13 14:06:41.096498 waagent[1667]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 14:06:41.096498 waagent[1667]: pkts bytes target prot opt in out source destination Dec 13 14:06:41.096498 waagent[1667]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 14:06:41.096498 waagent[1667]: 2 112 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 14:06:41.096498 waagent[1667]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 14:06:46.925833 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 14:06:46.926009 systemd[1]: Stopped kubelet.service. Dec 13 14:06:46.927440 systemd[1]: Starting kubelet.service... Dec 13 14:06:47.008429 systemd[1]: Started kubelet.service. Dec 13 14:06:47.053018 kubelet[1711]: E1213 14:06:47.052955 1711 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:47.055353 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:47.055476 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:06:57.290795 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 14:06:57.290971 systemd[1]: Stopped kubelet.service. Dec 13 14:06:57.292389 systemd[1]: Starting kubelet.service... Dec 13 14:06:57.373317 systemd[1]: Started kubelet.service. Dec 13 14:06:57.408168 kubelet[1720]: E1213 14:06:57.408120 1720 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:06:57.410342 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:06:57.410479 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:05.250903 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Dec 13 14:07:07.540842 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 14:07:07.541026 systemd[1]: Stopped kubelet.service. Dec 13 14:07:07.542421 systemd[1]: Starting kubelet.service... Dec 13 14:07:07.623311 systemd[1]: Started kubelet.service. Dec 13 14:07:07.709767 kubelet[1729]: E1213 14:07:07.709725 1729 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:07.712018 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:07.712142 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:10.738824 update_engine[1445]: I1213 14:07:10.738442 1445 update_attempter.cc:509] Updating boot flags... Dec 13 14:07:15.142629 systemd[1]: Created slice system-sshd.slice. Dec 13 14:07:15.144284 systemd[1]: Started sshd@0-10.200.20.33:22-10.200.16.10:49460.service. Dec 13 14:07:15.737666 sshd[1801]: Accepted publickey for core from 10.200.16.10 port 49460 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:15.755686 sshd[1801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:15.759697 systemd-logind[1444]: New session 3 of user core. Dec 13 14:07:15.760124 systemd[1]: Started session-3.scope. Dec 13 14:07:16.104569 systemd[1]: Started sshd@1-10.200.20.33:22-10.200.16.10:49464.service. Dec 13 14:07:16.522826 sshd[1806]: Accepted publickey for core from 10.200.16.10 port 49464 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:16.524188 sshd[1806]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:16.528281 systemd-logind[1444]: New session 4 of user core. Dec 13 14:07:16.528739 systemd[1]: Started session-4.scope. Dec 13 14:07:16.863796 sshd[1806]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:16.866636 systemd[1]: sshd@1-10.200.20.33:22-10.200.16.10:49464.service: Deactivated successfully. Dec 13 14:07:16.867378 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 14:07:16.867896 systemd-logind[1444]: Session 4 logged out. Waiting for processes to exit. Dec 13 14:07:16.868892 systemd-logind[1444]: Removed session 4. Dec 13 14:07:16.931365 systemd[1]: Started sshd@2-10.200.20.33:22-10.200.16.10:49466.service. Dec 13 14:07:17.335729 sshd[1812]: Accepted publickey for core from 10.200.16.10 port 49466 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:17.337099 sshd[1812]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:17.341133 systemd-logind[1444]: New session 5 of user core. Dec 13 14:07:17.341626 systemd[1]: Started session-5.scope. Dec 13 14:07:17.641582 sshd[1812]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:17.644378 systemd[1]: sshd@2-10.200.20.33:22-10.200.16.10:49466.service: Deactivated successfully. Dec 13 14:07:17.645099 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 14:07:17.645663 systemd-logind[1444]: Session 5 logged out. Waiting for processes to exit. Dec 13 14:07:17.646524 systemd-logind[1444]: Removed session 5. Dec 13 14:07:17.709535 systemd[1]: Started sshd@3-10.200.20.33:22-10.200.16.10:49476.service. Dec 13 14:07:17.718847 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 14:07:17.719007 systemd[1]: Stopped kubelet.service. Dec 13 14:07:17.720414 systemd[1]: Starting kubelet.service... Dec 13 14:07:17.804282 systemd[1]: Started kubelet.service. Dec 13 14:07:17.837302 kubelet[1827]: E1213 14:07:17.837262 1827 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:17.839309 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:17.839437 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:18.117584 sshd[1821]: Accepted publickey for core from 10.200.16.10 port 49476 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:18.119049 sshd[1821]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:18.122869 systemd-logind[1444]: New session 6 of user core. Dec 13 14:07:18.123388 systemd[1]: Started session-6.scope. Dec 13 14:07:18.430779 sshd[1821]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:18.433491 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 14:07:18.434071 systemd-logind[1444]: Session 6 logged out. Waiting for processes to exit. Dec 13 14:07:18.434227 systemd[1]: sshd@3-10.200.20.33:22-10.200.16.10:49476.service: Deactivated successfully. Dec 13 14:07:18.435283 systemd-logind[1444]: Removed session 6. Dec 13 14:07:18.508936 systemd[1]: Started sshd@4-10.200.20.33:22-10.200.16.10:47454.service. Dec 13 14:07:18.911592 sshd[1836]: Accepted publickey for core from 10.200.16.10 port 47454 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:18.913298 sshd[1836]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:18.917723 systemd[1]: Started session-7.scope. Dec 13 14:07:18.918395 systemd-logind[1444]: New session 7 of user core. Dec 13 14:07:19.416351 sudo[1839]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 14:07:19.416578 sudo[1839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:19.471392 dbus-daemon[1428]: avc: received setenforce notice (enforcing=1) Dec 13 14:07:19.473187 sudo[1839]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:19.566167 sshd[1836]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:19.569764 systemd[1]: sshd@4-10.200.20.33:22-10.200.16.10:47454.service: Deactivated successfully. Dec 13 14:07:19.569944 systemd-logind[1444]: Session 7 logged out. Waiting for processes to exit. Dec 13 14:07:19.570560 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 14:07:19.571350 systemd-logind[1444]: Removed session 7. Dec 13 14:07:19.636237 systemd[1]: Started sshd@5-10.200.20.33:22-10.200.16.10:47458.service. Dec 13 14:07:20.048306 sshd[1843]: Accepted publickey for core from 10.200.16.10 port 47458 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:20.049681 sshd[1843]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:20.053654 systemd-logind[1444]: New session 8 of user core. Dec 13 14:07:20.054087 systemd[1]: Started session-8.scope. Dec 13 14:07:20.286648 sudo[1847]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 14:07:20.286869 sudo[1847]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:20.289574 sudo[1847]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:20.294376 sudo[1846]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 14:07:20.294586 sudo[1846]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:20.303673 systemd[1]: Stopping audit-rules.service... Dec 13 14:07:20.303000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:07:20.309295 kernel: kauditd_printk_skb: 145 callbacks suppressed Dec 13 14:07:20.309382 kernel: audit: type=1305 audit(1734098840.303:225): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 14:07:20.309649 auditctl[1850]: No rules Dec 13 14:07:20.310164 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 14:07:20.303000 audit[1850]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb620300 a2=420 a3=0 items=0 ppid=1 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:20.310370 systemd[1]: Stopped audit-rules.service. Dec 13 14:07:20.322318 systemd[1]: Starting audit-rules.service... Dec 13 14:07:20.344348 kernel: audit: type=1300 audit(1734098840.303:225): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdb620300 a2=420 a3=0 items=0 ppid=1 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:20.303000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:07:20.352959 kernel: audit: type=1327 audit(1734098840.303:225): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 14:07:20.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.372949 kernel: audit: type=1131 audit(1734098840.309:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.373017 augenrules[1867]: No rules Dec 13 14:07:20.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.373569 systemd[1]: Finished audit-rules.service. Dec 13 14:07:20.375518 sudo[1846]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:20.398145 kernel: audit: type=1130 audit(1734098840.372:227): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.374000 audit[1846]: USER_END pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.418627 kernel: audit: type=1106 audit(1734098840.374:228): pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.418716 kernel: audit: type=1104 audit(1734098840.374:229): pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.374000 audit[1846]: CRED_DISP pid=1846 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.498428 sshd[1843]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:20.498000 audit[1843]: USER_END pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:20.526406 systemd[1]: sshd@5-10.200.20.33:22-10.200.16.10:47458.service: Deactivated successfully. Dec 13 14:07:20.498000 audit[1843]: CRED_DISP pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:20.548187 kernel: audit: type=1106 audit(1734098840.498:230): pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:20.548349 kernel: audit: type=1104 audit(1734098840.498:231): pid=1843 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:20.548396 kernel: audit: type=1131 audit(1734098840.525:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.33:22-10.200.16.10:47458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.33:22-10.200.16.10:47458 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:20.527131 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 14:07:20.547914 systemd-logind[1444]: Session 8 logged out. Waiting for processes to exit. Dec 13 14:07:20.567347 systemd-logind[1444]: Removed session 8. Dec 13 14:07:20.594302 systemd[1]: Started sshd@6-10.200.20.33:22-10.200.16.10:47474.service. Dec 13 14:07:20.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.16.10:47474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:21.003000 audit[1873]: USER_ACCT pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:21.005124 sshd[1873]: Accepted publickey for core from 10.200.16.10 port 47474 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:07:21.005000 audit[1873]: CRED_ACQ pid=1873 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:21.005000 audit[1873]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe895a2a0 a2=3 a3=1 items=0 ppid=1 pid=1873 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:07:21.006941 sshd[1873]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:07:21.011023 systemd-logind[1444]: New session 9 of user core. Dec 13 14:07:21.011531 systemd[1]: Started session-9.scope. Dec 13 14:07:21.014000 audit[1873]: USER_START pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:21.016000 audit[1875]: CRED_ACQ pid=1875 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:21.241000 audit[1876]: USER_ACCT pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:21.243172 sudo[1876]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 14:07:21.242000 audit[1876]: CRED_REFR pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:21.243416 sudo[1876]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 14:07:21.243000 audit[1876]: USER_START pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:21.264846 systemd[1]: Starting docker.service... Dec 13 14:07:21.316444 env[1886]: time="2024-12-13T14:07:21.316389830Z" level=info msg="Starting up" Dec 13 14:07:21.324509 env[1886]: time="2024-12-13T14:07:21.324470348Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:07:21.324509 env[1886]: time="2024-12-13T14:07:21.324501788Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:07:21.324658 env[1886]: time="2024-12-13T14:07:21.324527468Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:07:21.324658 env[1886]: time="2024-12-13T14:07:21.324538028Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:07:21.326695 env[1886]: time="2024-12-13T14:07:21.326662747Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 14:07:21.326695 env[1886]: time="2024-12-13T14:07:21.326689467Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 14:07:21.326808 env[1886]: time="2024-12-13T14:07:21.326707507Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 14:07:21.326808 env[1886]: time="2024-12-13T14:07:21.326716307Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 14:07:21.332071 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1864450888-merged.mount: Deactivated successfully. Dec 13 14:07:21.431591 env[1886]: time="2024-12-13T14:07:21.431111002Z" level=info msg="Loading containers: start." Dec 13 14:07:21.527000 audit[1914]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.527000 audit[1914]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffc3b9fbb0 a2=0 a3=1 items=0 ppid=1886 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.527000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 14:07:21.529000 audit[1916]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.529000 audit[1916]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffffe2cdb10 a2=0 a3=1 items=0 ppid=1886 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 14:07:21.531000 audit[1918]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.531000 audit[1918]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcc0be7f0 a2=0 a3=1 items=0 ppid=1886 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:07:21.533000 audit[1920]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.533000 audit[1920]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe7d317a0 a2=0 a3=1 items=0 ppid=1886 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:07:21.534000 audit[1922]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.534000 audit[1922]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe69421b0 a2=0 a3=1 items=0 ppid=1886 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.534000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 14:07:21.536000 audit[1924]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.536000 audit[1924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff3c2bd10 a2=0 a3=1 items=0 ppid=1886 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.536000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 14:07:21.554000 audit[1926]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.554000 audit[1926]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff6da9460 a2=0 a3=1 items=0 ppid=1886 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.554000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 14:07:21.556000 audit[1928]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.556000 audit[1928]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe6c23130 a2=0 a3=1 items=0 ppid=1886 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.556000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 14:07:21.557000 audit[1930]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1930 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.557000 audit[1930]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffff7f3d70 a2=0 a3=1 items=0 ppid=1886 pid=1930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:21.573000 audit[1934]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1934 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.573000 audit[1934]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffc06a9ad0 a2=0 a3=1 items=0 ppid=1886 pid=1934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.573000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:21.581000 audit[1935]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1935 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.581000 audit[1935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe755e030 a2=0 a3=1 items=0 ppid=1886 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.581000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:21.625222 kernel: Initializing XFRM netlink socket Dec 13 14:07:21.661979 env[1886]: time="2024-12-13T14:07:21.661919066Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 14:07:21.764000 audit[1943]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1943 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.764000 audit[1943]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffff5d56da0 a2=0 a3=1 items=0 ppid=1886 pid=1943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 14:07:21.775000 audit[1946]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1946 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.775000 audit[1946]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc6fef070 a2=0 a3=1 items=0 ppid=1886 pid=1946 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.775000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 14:07:21.778000 audit[1949]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1949 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.778000 audit[1949]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd7ab28a0 a2=0 a3=1 items=0 ppid=1886 pid=1949 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 14:07:21.780000 audit[1951]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1951 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.780000 audit[1951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffffdf8bf0 a2=0 a3=1 items=0 ppid=1886 pid=1951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.780000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 14:07:21.782000 audit[1953]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1953 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.782000 audit[1953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdc32eb70 a2=0 a3=1 items=0 ppid=1886 pid=1953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.782000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 14:07:21.784000 audit[1955]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1955 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.784000 audit[1955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff570dff0 a2=0 a3=1 items=0 ppid=1886 pid=1955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 14:07:21.786000 audit[1957]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1957 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.786000 audit[1957]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffde885360 a2=0 a3=1 items=0 ppid=1886 pid=1957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 14:07:21.788000 audit[1959]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1959 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.788000 audit[1959]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff7a37540 a2=0 a3=1 items=0 ppid=1886 pid=1959 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.788000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 14:07:21.790000 audit[1961]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1961 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.790000 audit[1961]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffead99fd0 a2=0 a3=1 items=0 ppid=1886 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 14:07:21.792000 audit[1963]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1963 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.792000 audit[1963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffffd5b7aa0 a2=0 a3=1 items=0 ppid=1886 pid=1963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 14:07:21.793000 audit[1965]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1965 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.793000 audit[1965]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc6f080e0 a2=0 a3=1 items=0 ppid=1886 pid=1965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.793000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 14:07:21.795662 systemd-networkd[1609]: docker0: Link UP Dec 13 14:07:21.816000 audit[1969]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1969 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.816000 audit[1969]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc07266a0 a2=0 a3=1 items=0 ppid=1886 pid=1969 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:21.824000 audit[1970]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1970 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:21.824000 audit[1970]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffffe59160 a2=0 a3=1 items=0 ppid=1886 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:21.824000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 14:07:21.825796 env[1886]: time="2024-12-13T14:07:21.825770707Z" level=info msg="Loading containers: done." Dec 13 14:07:21.835935 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2380168506-merged.mount: Deactivated successfully. Dec 13 14:07:21.889300 env[1886]: time="2024-12-13T14:07:21.889240731Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 14:07:21.889478 env[1886]: time="2024-12-13T14:07:21.889456371Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 14:07:21.889578 env[1886]: time="2024-12-13T14:07:21.889559491Z" level=info msg="Daemon has completed initialization" Dec 13 14:07:21.919434 systemd[1]: Started docker.service. Dec 13 14:07:21.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:21.925598 env[1886]: time="2024-12-13T14:07:21.925522883Z" level=info msg="API listen on /run/docker.sock" Dec 13 14:07:22.987651 env[1454]: time="2024-12-13T14:07:22.987603721Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 14:07:23.793111 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1564789469.mount: Deactivated successfully. Dec 13 14:07:25.248977 env[1454]: time="2024-12-13T14:07:25.248918641Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:25.258873 env[1454]: time="2024-12-13T14:07:25.258823011Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:25.262241 env[1454]: time="2024-12-13T14:07:25.262181146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:25.277639 env[1454]: time="2024-12-13T14:07:25.277591704Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:25.278244 env[1454]: time="2024-12-13T14:07:25.278183765Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:3e1123d6ebadbafa6eb77a9047f23f20befbbe2f177eb473a81b27a5de8c2ec5\"" Dec 13 14:07:25.279444 env[1454]: time="2024-12-13T14:07:25.279413167Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 14:07:26.711961 env[1454]: time="2024-12-13T14:07:26.711865167Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:26.717959 env[1454]: time="2024-12-13T14:07:26.717911383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:26.722175 env[1454]: time="2024-12-13T14:07:26.722117815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:26.726332 env[1454]: time="2024-12-13T14:07:26.726276409Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:26.727283 env[1454]: time="2024-12-13T14:07:26.727250659Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:d5369864a42bf2c01d3ad462832526b7d3e40620c0e75fecefbffc203562ad55\"" Dec 13 14:07:26.727858 env[1454]: time="2024-12-13T14:07:26.727834562Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 14:07:27.921869 env[1454]: time="2024-12-13T14:07:27.921812890Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:27.928218 env[1454]: time="2024-12-13T14:07:27.928158662Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:27.934038 env[1454]: time="2024-12-13T14:07:27.933992769Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:27.937553 env[1454]: time="2024-12-13T14:07:27.937512745Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:27.938173 env[1454]: time="2024-12-13T14:07:27.938141407Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:d99fc9a32f6b42ab5537eec09d599efae0f61c109406dae1ba255cec288fcb95\"" Dec 13 14:07:27.938758 env[1454]: time="2024-12-13T14:07:27.938728669Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 14:07:28.040716 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 14:07:28.065182 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 14:07:28.065246 kernel: audit: type=1130 audit(1734098848.039:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.040887 systemd[1]: Stopped kubelet.service. Dec 13 14:07:28.042605 systemd[1]: Starting kubelet.service... Dec 13 14:07:28.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.083028 kernel: audit: type=1131 audit(1734098848.039:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.156072 systemd[1]: Started kubelet.service. Dec 13 14:07:28.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.174240 kernel: audit: type=1130 audit(1734098848.155:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:28.207531 kubelet[2007]: E1213 14:07:28.207492 2007 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:28.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:28.209426 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:28.209551 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:28.230231 kernel: audit: type=1131 audit(1734098848.208:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:30.298408 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1095935197.mount: Deactivated successfully. Dec 13 14:07:30.793767 env[1454]: time="2024-12-13T14:07:30.793720022Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.798343 env[1454]: time="2024-12-13T14:07:30.798302257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.802441 env[1454]: time="2024-12-13T14:07:30.802406745Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.805098 env[1454]: time="2024-12-13T14:07:30.805057033Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:30.805577 env[1454]: time="2024-12-13T14:07:30.805551500Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:34e142197cb996099cc1e98902c112642b3fb3dc559140c0a95279aa8d254d3a\"" Dec 13 14:07:30.806284 env[1454]: time="2024-12-13T14:07:30.806259921Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 14:07:31.445732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount958386775.mount: Deactivated successfully. Dec 13 14:07:32.554805 env[1454]: time="2024-12-13T14:07:32.554739509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:32.568087 env[1454]: time="2024-12-13T14:07:32.568019007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:32.583087 env[1454]: time="2024-12-13T14:07:32.583030500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:32.590887 env[1454]: time="2024-12-13T14:07:32.590841299Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:32.591867 env[1454]: time="2024-12-13T14:07:32.591841273Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Dec 13 14:07:32.592546 env[1454]: time="2024-12-13T14:07:32.592512016Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 14:07:33.143049 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1312740569.mount: Deactivated successfully. Dec 13 14:07:33.169969 env[1454]: time="2024-12-13T14:07:33.169913217Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.180145 env[1454]: time="2024-12-13T14:07:33.180097962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.185654 env[1454]: time="2024-12-13T14:07:33.185615943Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.189533 env[1454]: time="2024-12-13T14:07:33.189499006Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:33.189936 env[1454]: time="2024-12-13T14:07:33.189906916Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:afb61768ce381961ca0beff95337601f29dc70ff3ed14e5e4b3e5699057e6aa8\"" Dec 13 14:07:33.190563 env[1454]: time="2024-12-13T14:07:33.190535180Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 14:07:33.816331 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount914660702.mount: Deactivated successfully. Dec 13 14:07:36.369474 env[1454]: time="2024-12-13T14:07:36.369407918Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.377044 env[1454]: time="2024-12-13T14:07:36.376999223Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.383420 env[1454]: time="2024-12-13T14:07:36.383366636Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.391432 env[1454]: time="2024-12-13T14:07:36.391393730Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:36.392360 env[1454]: time="2024-12-13T14:07:36.392329788Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:27e3830e1402783674d8b594038967deea9d51f0d91b34c93c8f39d2f68af7da\"" Dec 13 14:07:38.290734 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Dec 13 14:07:38.290919 systemd[1]: Stopped kubelet.service. Dec 13 14:07:38.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.292464 systemd[1]: Starting kubelet.service... Dec 13 14:07:38.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.329964 kernel: audit: type=1130 audit(1734098858.289:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.330055 kernel: audit: type=1131 audit(1734098858.289:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.462328 systemd[1]: Started kubelet.service. Dec 13 14:07:38.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.490244 kernel: audit: type=1130 audit(1734098858.461:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:38.533402 kubelet[2034]: E1213 14:07:38.533269 2034 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 14:07:38.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:38.535728 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 14:07:38.535848 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 14:07:38.556238 kernel: audit: type=1131 audit(1734098858.534:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:40.475947 systemd[1]: Stopped kubelet.service. Dec 13 14:07:40.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:40.479589 systemd[1]: Starting kubelet.service... Dec 13 14:07:40.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:40.515211 kernel: audit: type=1130 audit(1734098860.474:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:40.515315 kernel: audit: type=1131 audit(1734098860.474:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:40.536261 systemd[1]: Reloading. Dec 13 14:07:40.629998 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-12-13T14:07:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:07:40.630032 /usr/lib/systemd/system-generators/torcx-generator[2066]: time="2024-12-13T14:07:40Z" level=info msg="torcx already run" Dec 13 14:07:40.707441 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:07:40.707629 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:07:40.723570 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.830259 kernel: audit: type=1400 audit(1734098860.791:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.830355 kernel: audit: type=1400 audit(1734098860.791:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.850693 kernel: audit: type=1400 audit(1734098860.791:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.851301 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.809000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.809000 audit: BPF prog-id=47 op=LOAD Dec 13 14:07:40.809000 audit: BPF prog-id=39 op=UNLOAD Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.810000 audit: BPF prog-id=48 op=LOAD Dec 13 14:07:40.810000 audit: BPF prog-id=46 op=UNLOAD Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit: BPF prog-id=49 op=LOAD Dec 13 14:07:40.829000 audit: BPF prog-id=40 op=UNLOAD Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.829000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit: BPF prog-id=50 op=LOAD Dec 13 14:07:40.849000 audit: BPF prog-id=31 op=UNLOAD Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit: BPF prog-id=51 op=LOAD Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.849000 audit: BPF prog-id=52 op=LOAD Dec 13 14:07:40.856000 audit: BPF prog-id=33 op=UNLOAD Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit: BPF prog-id=53 op=LOAD Dec 13 14:07:40.856000 audit: BPF prog-id=41 op=UNLOAD Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.856000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit: BPF prog-id=54 op=LOAD Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit: BPF prog-id=55 op=LOAD Dec 13 14:07:40.857000 audit: BPF prog-id=42 op=UNLOAD Dec 13 14:07:40.857000 audit: BPF prog-id=43 op=UNLOAD Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit: BPF prog-id=56 op=LOAD Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.857000 audit: BPF prog-id=57 op=LOAD Dec 13 14:07:40.857000 audit: BPF prog-id=34 op=UNLOAD Dec 13 14:07:40.857000 audit: BPF prog-id=35 op=UNLOAD Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.859000 audit: BPF prog-id=58 op=LOAD Dec 13 14:07:40.859000 audit: BPF prog-id=44 op=UNLOAD Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit: BPF prog-id=59 op=LOAD Dec 13 14:07:40.860000 audit: BPF prog-id=36 op=UNLOAD Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit: BPF prog-id=60 op=LOAD Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:40.860000 audit: BPF prog-id=61 op=LOAD Dec 13 14:07:40.860000 audit: BPF prog-id=37 op=UNLOAD Dec 13 14:07:40.860000 audit: BPF prog-id=38 op=UNLOAD Dec 13 14:07:40.881772 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 14:07:40.881834 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 14:07:40.882023 systemd[1]: Stopped kubelet.service. Dec 13 14:07:40.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 14:07:40.883859 systemd[1]: Starting kubelet.service... Dec 13 14:07:40.968522 systemd[1]: Started kubelet.service. Dec 13 14:07:40.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:41.021882 kubelet[2131]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:41.022186 kubelet[2131]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:07:41.022278 kubelet[2131]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:41.022414 kubelet[2131]: I1213 14:07:41.022385 2131 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:07:42.271570 kubelet[2131]: I1213 14:07:42.271529 2131 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:07:42.271926 kubelet[2131]: I1213 14:07:42.271914 2131 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:07:42.272266 kubelet[2131]: I1213 14:07:42.272251 2131 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:07:42.292813 kubelet[2131]: E1213 14:07:42.292763 2131 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.20.33:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:42.293579 kubelet[2131]: I1213 14:07:42.293539 2131 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:07:42.303253 kubelet[2131]: E1213 14:07:42.303219 2131 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:07:42.303414 kubelet[2131]: I1213 14:07:42.303401 2131 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:07:42.307923 kubelet[2131]: I1213 14:07:42.307892 2131 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:07:42.308858 kubelet[2131]: I1213 14:07:42.308838 2131 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:07:42.309131 kubelet[2131]: I1213 14:07:42.309099 2131 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:07:42.309397 kubelet[2131]: I1213 14:07:42.309207 2131 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-02735da4ec","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:07:42.309551 kubelet[2131]: I1213 14:07:42.309538 2131 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:07:42.309612 kubelet[2131]: I1213 14:07:42.309603 2131 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:07:42.309792 kubelet[2131]: I1213 14:07:42.309781 2131 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:42.311516 kubelet[2131]: I1213 14:07:42.311498 2131 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:07:42.311620 kubelet[2131]: I1213 14:07:42.311609 2131 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:07:42.311692 kubelet[2131]: I1213 14:07:42.311683 2131 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:07:42.311749 kubelet[2131]: I1213 14:07:42.311740 2131 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:07:42.316873 kubelet[2131]: I1213 14:07:42.316839 2131 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:07:42.318575 kubelet[2131]: I1213 14:07:42.318550 2131 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:07:42.319527 kubelet[2131]: W1213 14:07:42.319476 2131 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 14:07:42.320126 kubelet[2131]: I1213 14:07:42.320084 2131 server.go:1269] "Started kubelet" Dec 13 14:07:42.320331 kubelet[2131]: W1213 14:07:42.320280 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-02735da4ec&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:42.320389 kubelet[2131]: E1213 14:07:42.320341 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-02735da4ec&limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:42.326510 kubelet[2131]: W1213 14:07:42.326460 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:42.326678 kubelet[2131]: E1213 14:07:42.326658 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.33:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:42.326814 kubelet[2131]: I1213 14:07:42.326770 2131 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:07:42.327131 kubelet[2131]: I1213 14:07:42.327116 2131 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:07:42.327787 kubelet[2131]: I1213 14:07:42.327758 2131 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:07:42.328824 kubelet[2131]: I1213 14:07:42.328801 2131 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:07:42.329503 kubelet[2131]: E1213 14:07:42.328409 2131 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.20.33:6443/api/v1/namespaces/default/events\": dial tcp 10.200.20.33:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-02735da4ec.1810c1ba45ff0150 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-02735da4ec,UID:ci-3510.3.6-a-02735da4ec,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-02735da4ec,},FirstTimestamp:2024-12-13 14:07:42.320058704 +0000 UTC m=+1.346629765,LastTimestamp:2024-12-13 14:07:42.320058704 +0000 UTC m=+1.346629765,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-02735da4ec,}" Dec 13 14:07:42.329000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:42.329000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:42.329000 audit[2131]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aebfb0 a1=4000b21218 a2=4000aebf80 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.329000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:42.331163 kubelet[2131]: E1213 14:07:42.331092 2131 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 14:07:42.331256 kubelet[2131]: I1213 14:07:42.331233 2131 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:07:42.330000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:42.330000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:42.330000 audit[2131]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000aef960 a1=4000b21230 a2=4000c38060 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.330000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:42.331509 kubelet[2131]: I1213 14:07:42.331493 2131 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:07:42.331653 kubelet[2131]: I1213 14:07:42.331641 2131 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:07:42.332431 kubelet[2131]: I1213 14:07:42.332401 2131 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:07:42.332524 kubelet[2131]: I1213 14:07:42.332505 2131 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:07:42.333734 kubelet[2131]: I1213 14:07:42.333698 2131 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:07:42.333804 kubelet[2131]: I1213 14:07:42.333779 2131 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:07:42.333000 audit[2142]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2142 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.333000 audit[2142]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc5f3f100 a2=0 a3=1 items=0 ppid=2131 pid=2142 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:07:42.335056 kubelet[2131]: E1213 14:07:42.335015 2131 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-02735da4ec\" not found" Dec 13 14:07:42.334000 audit[2143]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2143 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.334000 audit[2143]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc5be8f00 a2=0 a3=1 items=0 ppid=2131 pid=2143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:07:42.336741 kubelet[2131]: I1213 14:07:42.336709 2131 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:07:42.337125 kubelet[2131]: I1213 14:07:42.337095 2131 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:07:42.337635 kubelet[2131]: E1213 14:07:42.337590 2131 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-02735da4ec?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="200ms" Dec 13 14:07:42.340427 kubelet[2131]: I1213 14:07:42.340380 2131 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:07:42.340527 kubelet[2131]: W1213 14:07:42.340368 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:42.340616 kubelet[2131]: E1213 14:07:42.340597 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:42.340000 audit[2145]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2145 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.340000 audit[2145]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff38af350 a2=0 a3=1 items=0 ppid=2131 pid=2145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:42.345000 audit[2147]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2147 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.345000 audit[2147]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc3502720 a2=0 a3=1 items=0 ppid=2131 pid=2147 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:42.394443 kubelet[2131]: I1213 14:07:42.394421 2131 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:07:42.394577 kubelet[2131]: I1213 14:07:42.394565 2131 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:07:42.394655 kubelet[2131]: I1213 14:07:42.394647 2131 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:42.399718 kubelet[2131]: I1213 14:07:42.399694 2131 policy_none.go:49] "None policy: Start" Dec 13 14:07:42.400569 kubelet[2131]: I1213 14:07:42.400555 2131 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:07:42.400653 kubelet[2131]: I1213 14:07:42.400644 2131 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:07:42.409327 systemd[1]: Created slice kubepods.slice. Dec 13 14:07:42.413791 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 14:07:42.416871 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 14:07:42.427931 kubelet[2131]: I1213 14:07:42.427906 2131 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:07:42.426000 audit[2131]: AVC avc: denied { mac_admin } for pid=2131 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:42.426000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:42.426000 audit[2131]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000af6330 a1=4000e5efa8 a2=4000af62d0 a3=25 items=0 ppid=1 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.426000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:42.428338 kubelet[2131]: I1213 14:07:42.428319 2131 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:07:42.428541 kubelet[2131]: I1213 14:07:42.428528 2131 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:07:42.431375 kubelet[2131]: I1213 14:07:42.428603 2131 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:07:42.431375 kubelet[2131]: I1213 14:07:42.429509 2131 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:07:42.431375 kubelet[2131]: E1213 14:07:42.431267 2131 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-02735da4ec\" not found" Dec 13 14:07:42.433000 audit[2154]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.433000 audit[2154]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdb4ed600 a2=0 a3=1 items=0 ppid=2131 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 14:07:42.435167 kubelet[2131]: I1213 14:07:42.435138 2131 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:07:42.434000 audit[2156]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.434000 audit[2156]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcbac3ae0 a2=0 a3=1 items=0 ppid=2131 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:07:42.435000 audit[2155]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:42.435000 audit[2155]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc3dc2450 a2=0 a3=1 items=0 ppid=2131 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 14:07:42.436899 kubelet[2131]: I1213 14:07:42.436874 2131 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:07:42.436960 kubelet[2131]: I1213 14:07:42.436903 2131 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:07:42.436960 kubelet[2131]: I1213 14:07:42.436921 2131 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:07:42.437004 kubelet[2131]: E1213 14:07:42.436957 2131 kubelet.go:2345] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Dec 13 14:07:42.436000 audit[2158]: NETFILTER_CFG table=mangle:37 family=10 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:42.436000 audit[2158]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd343a40 a2=0 a3=1 items=0 ppid=2131 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.436000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 14:07:42.438578 kubelet[2131]: W1213 14:07:42.438525 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:42.438647 kubelet[2131]: E1213 14:07:42.438589 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:42.438000 audit[2157]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.438000 audit[2157]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0325390 a2=0 a3=1 items=0 ppid=2131 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:07:42.438000 audit[2159]: NETFILTER_CFG table=nat:39 family=10 entries=2 op=nft_register_chain pid=2159 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:42.438000 audit[2159]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffc0837fc0 a2=0 a3=1 items=0 ppid=2131 pid=2159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.438000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 14:07:42.439000 audit[2160]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2160 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:42.439000 audit[2160]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd59e3ad0 a2=0 a3=1 items=0 ppid=2131 pid=2160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:07:42.440000 audit[2161]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2161 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:42.440000 audit[2161]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffde568b10 a2=0 a3=1 items=0 ppid=2131 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:42.440000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 14:07:42.532253 kubelet[2131]: I1213 14:07:42.530890 2131 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.532482 kubelet[2131]: E1213 14:07:42.532458 2131 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.538128 kubelet[2131]: E1213 14:07:42.538094 2131 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-02735da4ec?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="400ms" Dec 13 14:07:42.546332 systemd[1]: Created slice kubepods-burstable-pod556a6a714cee921607370cc25c86d6a2.slice. Dec 13 14:07:42.559288 systemd[1]: Created slice kubepods-burstable-podc852b0cd0c70d259567990f0e6b476d0.slice. Dec 13 14:07:42.563716 systemd[1]: Created slice kubepods-burstable-pod7e83ad2343288ff0d439be2ddf58bf03.slice. Dec 13 14:07:42.635439 kubelet[2131]: I1213 14:07:42.635393 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/556a6a714cee921607370cc25c86d6a2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-02735da4ec\" (UID: \"556a6a714cee921607370cc25c86d6a2\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.635672 kubelet[2131]: I1213 14:07:42.635657 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.635780 kubelet[2131]: I1213 14:07:42.635768 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.635894 kubelet[2131]: I1213 14:07:42.635879 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.636002 kubelet[2131]: I1213 14:07:42.635990 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.636097 kubelet[2131]: I1213 14:07:42.636086 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.636189 kubelet[2131]: I1213 14:07:42.636177 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.636324 kubelet[2131]: I1213 14:07:42.636311 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.636427 kubelet[2131]: I1213 14:07:42.636414 2131 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.735105 kubelet[2131]: I1213 14:07:42.735078 2131 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.735471 kubelet[2131]: E1213 14:07:42.735444 2131 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:42.859012 env[1454]: time="2024-12-13T14:07:42.858693438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-02735da4ec,Uid:556a6a714cee921607370cc25c86d6a2,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:42.863593 env[1454]: time="2024-12-13T14:07:42.863547223Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-02735da4ec,Uid:c852b0cd0c70d259567990f0e6b476d0,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:42.866734 env[1454]: time="2024-12-13T14:07:42.866575683Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-02735da4ec,Uid:7e83ad2343288ff0d439be2ddf58bf03,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:42.939806 kubelet[2131]: E1213 14:07:42.939748 2131 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-02735da4ec?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="800ms" Dec 13 14:07:43.138594 kubelet[2131]: I1213 14:07:43.138168 2131 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:43.138870 kubelet[2131]: E1213 14:07:43.138832 2131 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:43.303168 kubelet[2131]: W1213 14:07:43.303096 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.20.33:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:43.303554 kubelet[2131]: E1213 14:07:43.303176 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.20.33:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:43.350850 kubelet[2131]: W1213 14:07:43.350788 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-02735da4ec&limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:43.350990 kubelet[2131]: E1213 14:07:43.350861 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.20.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-02735da4ec&limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:43.480903 kubelet[2131]: W1213 14:07:43.480381 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:43.480903 kubelet[2131]: E1213 14:07:43.480427 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.20.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:43.522155 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2767671379.mount: Deactivated successfully. Dec 13 14:07:43.552038 env[1454]: time="2024-12-13T14:07:43.551982280Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.566768 env[1454]: time="2024-12-13T14:07:43.566728516Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.574861 env[1454]: time="2024-12-13T14:07:43.574819841Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.579456 env[1454]: time="2024-12-13T14:07:43.579397153Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.585960 env[1454]: time="2024-12-13T14:07:43.585910587Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.589093 env[1454]: time="2024-12-13T14:07:43.589059487Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.592649 env[1454]: time="2024-12-13T14:07:43.592611899Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.596717 env[1454]: time="2024-12-13T14:07:43.596666901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.600770 env[1454]: time="2024-12-13T14:07:43.600734422Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.606438 env[1454]: time="2024-12-13T14:07:43.606397114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.611918 env[1454]: time="2024-12-13T14:07:43.611866928Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.616112 env[1454]: time="2024-12-13T14:07:43.616076408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:43.675343 env[1454]: time="2024-12-13T14:07:43.675270470Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:43.675343 env[1454]: time="2024-12-13T14:07:43.675310789Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:43.675557 env[1454]: time="2024-12-13T14:07:43.675321469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:43.675751 env[1454]: time="2024-12-13T14:07:43.675713141Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b62e80b3d893afba40943671c8012832d06c8ee9d83e0f78e8c48effd3206f7 pid=2169 runtime=io.containerd.runc.v2 Dec 13 14:07:43.690724 env[1454]: time="2024-12-13T14:07:43.690513257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:43.690929 env[1454]: time="2024-12-13T14:07:43.690697133Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:43.691069 env[1454]: time="2024-12-13T14:07:43.691003887Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:43.691672 env[1454]: time="2024-12-13T14:07:43.691618555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9e9a8aca5ec68f52e5ae72378363a36d2a6321a2b9bf8ff5eea6a374b29833c0 pid=2191 runtime=io.containerd.runc.v2 Dec 13 14:07:43.699776 systemd[1]: Started cri-containerd-6b62e80b3d893afba40943671c8012832d06c8ee9d83e0f78e8c48effd3206f7.scope. Dec 13 14:07:43.713934 env[1454]: time="2024-12-13T14:07:43.713843608Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:43.713934 env[1454]: time="2024-12-13T14:07:43.713894047Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:43.714148 env[1454]: time="2024-12-13T14:07:43.713912567Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:43.714317 env[1454]: time="2024-12-13T14:07:43.714276960Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f02fa538a9debec1ee9ef05fc731f3597ec6ec888a78af4140ff0daa259b28a4 pid=2212 runtime=io.containerd.runc.v2 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.727451 kernel: kauditd_printk_skb: 220 callbacks suppressed Dec 13 14:07:43.727574 kernel: audit: type=1400 audit(1734098863.720:465): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.747395 kubelet[2131]: E1213 14:07:43.745507 2131 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-02735da4ec?timeout=10s\": dial tcp 10.200.20.33:6443: connect: connection refused" interval="1.6s" Dec 13 14:07:43.747395 kubelet[2131]: W1213 14:07:43.745854 2131 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.33:6443: connect: connection refused Dec 13 14:07:43.747395 kubelet[2131]: E1213 14:07:43.745892 2131 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.20.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.20.33:6443: connect: connection refused" logger="UnhandledError" Dec 13 14:07:43.765069 kernel: audit: type=1400 audit(1734098863.720:466): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.766855 systemd[1]: Started cri-containerd-9e9a8aca5ec68f52e5ae72378363a36d2a6321a2b9bf8ff5eea6a374b29833c0.scope. Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.786378 kernel: audit: type=1400 audit(1734098863.720:467): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.790501 systemd[1]: Started cri-containerd-f02fa538a9debec1ee9ef05fc731f3597ec6ec888a78af4140ff0daa259b28a4.scope. Dec 13 14:07:43.811948 kernel: audit: type=1400 audit(1734098863.720:468): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.833672 kernel: audit: type=1400 audit(1734098863.720:469): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.851456 kernel: audit: type=1400 audit(1734098863.720:470): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.870360 kernel: audit: type=1400 audit(1734098863.720:471): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.889080 kernel: audit: type=1400 audit(1734098863.720:472): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.889211 kernel: audit: type=1400 audit(1734098863.720:473): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927014 kernel: audit: type=1400 audit(1734098863.720:474): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.720000 audit: BPF prog-id=62 op=LOAD Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2169 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363265383062336438393361666261343039343336373163383031 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2169 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363265383062336438393361666261343039343336373163383031 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.721000 audit: BPF prog-id=63 op=LOAD Dec 13 14:07:43.721000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2169 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363265383062336438393361666261343039343336373163383031 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.726000 audit: BPF prog-id=64 op=LOAD Dec 13 14:07:43.726000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2169 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363265383062336438393361666261343039343336373163383031 Dec 13 14:07:43.751000 audit: BPF prog-id=64 op=UNLOAD Dec 13 14:07:43.751000 audit: BPF prog-id=63 op=UNLOAD Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { perfmon } for pid=2177 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit[2177]: AVC avc: denied { bpf } for pid=2177 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.751000 audit: BPF prog-id=65 op=LOAD Dec 13 14:07:43.751000 audit[2177]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2169 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662363265383062336438393361666261343039343336373163383031 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.888000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.888000 audit: BPF prog-id=66 op=LOAD Dec 13 14:07:43.906000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.926000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.927000 audit: BPF prog-id=67 op=LOAD Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2212 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326661353338613964656265633165653965663035666337333166 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2212 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326661353338613964656265633165653965663035666337333166 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit: BPF prog-id=68 op=LOAD Dec 13 14:07:43.929000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2212 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326661353338613964656265633165653965663035666337333166 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit: BPF prog-id=69 op=LOAD Dec 13 14:07:43.929000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2212 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326661353338613964656265633165653965663035666337333166 Dec 13 14:07:43.929000 audit: BPF prog-id=69 op=UNLOAD Dec 13 14:07:43.929000 audit: BPF prog-id=68 op=UNLOAD Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { perfmon } for pid=2233 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2233]: AVC avc: denied { bpf } for pid=2233 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit: BPF prog-id=70 op=LOAD Dec 13 14:07:43.929000 audit[2233]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2212 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6630326661353338613964656265633165653965663035666337333166 Dec 13 14:07:43.906000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2191 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396138616361356563363866353265356165373233373833363361 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2191 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396138616361356563363866353265356165373233373833363361 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit: BPF prog-id=71 op=LOAD Dec 13 14:07:43.929000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2191 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396138616361356563363866353265356165373233373833363361 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.929000 audit: BPF prog-id=72 op=LOAD Dec 13 14:07:43.929000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2191 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396138616361356563363866353265356165373233373833363361 Dec 13 14:07:43.930000 audit: BPF prog-id=72 op=UNLOAD Dec 13 14:07:43.930000 audit: BPF prog-id=71 op=UNLOAD Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { perfmon } for pid=2213 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit[2213]: AVC avc: denied { bpf } for pid=2213 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:43.930000 audit: BPF prog-id=73 op=LOAD Dec 13 14:07:43.930000 audit[2213]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2191 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:43.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965396138616361356563363866353265356165373233373833363361 Dec 13 14:07:43.940306 env[1454]: time="2024-12-13T14:07:43.939997381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-02735da4ec,Uid:556a6a714cee921607370cc25c86d6a2,Namespace:kube-system,Attempt:0,} returns sandbox id \"6b62e80b3d893afba40943671c8012832d06c8ee9d83e0f78e8c48effd3206f7\"" Dec 13 14:07:43.942057 kubelet[2131]: I1213 14:07:43.941299 2131 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:43.942057 kubelet[2131]: E1213 14:07:43.942024 2131 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.20.33:6443/api/v1/nodes\": dial tcp 10.200.20.33:6443: connect: connection refused" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:43.944481 env[1454]: time="2024-12-13T14:07:43.944442175Z" level=info msg="CreateContainer within sandbox \"6b62e80b3d893afba40943671c8012832d06c8ee9d83e0f78e8c48effd3206f7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 14:07:43.961318 env[1454]: time="2024-12-13T14:07:43.961264692Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-02735da4ec,Uid:7e83ad2343288ff0d439be2ddf58bf03,Namespace:kube-system,Attempt:0,} returns sandbox id \"9e9a8aca5ec68f52e5ae72378363a36d2a6321a2b9bf8ff5eea6a374b29833c0\"" Dec 13 14:07:43.967511 env[1454]: time="2024-12-13T14:07:43.967447053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-02735da4ec,Uid:c852b0cd0c70d259567990f0e6b476d0,Namespace:kube-system,Attempt:0,} returns sandbox id \"f02fa538a9debec1ee9ef05fc731f3597ec6ec888a78af4140ff0daa259b28a4\"" Dec 13 14:07:43.976251 env[1454]: time="2024-12-13T14:07:43.976012009Z" level=info msg="CreateContainer within sandbox \"f02fa538a9debec1ee9ef05fc731f3597ec6ec888a78af4140ff0daa259b28a4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 14:07:43.976426 env[1454]: time="2024-12-13T14:07:43.976386081Z" level=info msg="CreateContainer within sandbox \"9e9a8aca5ec68f52e5ae72378363a36d2a6321a2b9bf8ff5eea6a374b29833c0\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 14:07:44.029804 env[1454]: time="2024-12-13T14:07:44.029697311Z" level=info msg="CreateContainer within sandbox \"6b62e80b3d893afba40943671c8012832d06c8ee9d83e0f78e8c48effd3206f7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"24fc4580a0973b0269eeb205885d4a949ac9cc0b78a87df4648ce2d9adda9275\"" Dec 13 14:07:44.032373 env[1454]: time="2024-12-13T14:07:44.032339301Z" level=info msg="StartContainer for \"24fc4580a0973b0269eeb205885d4a949ac9cc0b78a87df4648ce2d9adda9275\"" Dec 13 14:07:44.049457 systemd[1]: Started cri-containerd-24fc4580a0973b0269eeb205885d4a949ac9cc0b78a87df4648ce2d9adda9275.scope. Dec 13 14:07:44.050351 env[1454]: time="2024-12-13T14:07:44.050307204Z" level=info msg="CreateContainer within sandbox \"9e9a8aca5ec68f52e5ae72378363a36d2a6321a2b9bf8ff5eea6a374b29833c0\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c588c515927dafa2850e78a529d0349642a086d12096906b339e4ebc89d039f6\"" Dec 13 14:07:44.052160 env[1454]: time="2024-12-13T14:07:44.052124050Z" level=info msg="StartContainer for \"c588c515927dafa2850e78a529d0349642a086d12096906b339e4ebc89d039f6\"" Dec 13 14:07:44.061357 env[1454]: time="2024-12-13T14:07:44.061313398Z" level=info msg="CreateContainer within sandbox \"f02fa538a9debec1ee9ef05fc731f3597ec6ec888a78af4140ff0daa259b28a4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"60c885d1b293dab3cd08fbe5ac55a2679a5a110cbcc794c88a4316da44ab0eac\"" Dec 13 14:07:44.062039 env[1454]: time="2024-12-13T14:07:44.062015385Z" level=info msg="StartContainer for \"60c885d1b293dab3cd08fbe5ac55a2679a5a110cbcc794c88a4316da44ab0eac\"" Dec 13 14:07:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.066000 audit: BPF prog-id=74 op=LOAD Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400019bb38 a2=10 a3=0 items=0 ppid=2169 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234666334353830613039373362303236396565623230353838356434 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400019b5a0 a2=3c a3=0 items=0 ppid=2169 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234666334353830613039373362303236396565623230353838356434 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.067000 audit: BPF prog-id=75 op=LOAD Dec 13 14:07:44.067000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019b8e0 a2=78 a3=0 items=0 ppid=2169 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234666334353830613039373362303236396565623230353838356434 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.068000 audit: BPF prog-id=76 op=LOAD Dec 13 14:07:44.068000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400019b670 a2=78 a3=0 items=0 ppid=2169 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234666334353830613039373362303236396565623230353838356434 Dec 13 14:07:44.068000 audit: BPF prog-id=76 op=UNLOAD Dec 13 14:07:44.069000 audit: BPF prog-id=75 op=UNLOAD Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.069000 audit: BPF prog-id=77 op=LOAD Dec 13 14:07:44.069000 audit[2295]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400019bb40 a2=78 a3=0 items=0 ppid=2169 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.069000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234666334353830613039373362303236396565623230353838356434 Dec 13 14:07:44.092755 systemd[1]: Started cri-containerd-60c885d1b293dab3cd08fbe5ac55a2679a5a110cbcc794c88a4316da44ab0eac.scope. Dec 13 14:07:44.095286 systemd[1]: Started cri-containerd-c588c515927dafa2850e78a529d0349642a086d12096906b339e4ebc89d039f6.scope. Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.107000 audit: BPF prog-id=78 op=LOAD Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2212 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633838356431623239336461623363643038666265356163353561 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2212 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633838356431623239336461623363643038666265356163353561 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.108000 audit: BPF prog-id=79 op=LOAD Dec 13 14:07:44.108000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2212 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633838356431623239336461623363643038666265356163353561 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit: BPF prog-id=80 op=LOAD Dec 13 14:07:44.109000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2212 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633838356431623239336461623363643038666265356163353561 Dec 13 14:07:44.109000 audit: BPF prog-id=80 op=UNLOAD Dec 13 14:07:44.109000 audit: BPF prog-id=79 op=UNLOAD Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { perfmon } for pid=2335 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit[2335]: AVC avc: denied { bpf } for pid=2335 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.109000 audit: BPF prog-id=81 op=LOAD Dec 13 14:07:44.109000 audit[2335]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2212 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630633838356431623239336461623363643038666265356163353561 Dec 13 14:07:44.123580 env[1454]: time="2024-12-13T14:07:44.122862685Z" level=info msg="StartContainer for \"24fc4580a0973b0269eeb205885d4a949ac9cc0b78a87df4648ce2d9adda9275\" returns successfully" Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.130000 audit: BPF prog-id=82 op=LOAD Dec 13 14:07:44.131000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.131000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2191 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383863353135393237646166613238353065373861353239643033 Dec 13 14:07:44.131000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.131000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2191 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.131000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383863353135393237646166613238353065373861353239643033 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit: BPF prog-id=83 op=LOAD Dec 13 14:07:44.132000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2191 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383863353135393237646166613238353065373861353239643033 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.132000 audit: BPF prog-id=84 op=LOAD Dec 13 14:07:44.132000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2191 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.132000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383863353135393237646166613238353065373861353239643033 Dec 13 14:07:44.133000 audit: BPF prog-id=84 op=UNLOAD Dec 13 14:07:44.133000 audit: BPF prog-id=83 op=UNLOAD Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { perfmon } for pid=2324 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit[2324]: AVC avc: denied { bpf } for pid=2324 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:44.133000 audit: BPF prog-id=85 op=LOAD Dec 13 14:07:44.133000 audit[2324]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2191 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:44.133000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335383863353135393237646166613238353065373861353239643033 Dec 13 14:07:44.150076 env[1454]: time="2024-12-13T14:07:44.150026656Z" level=info msg="StartContainer for \"60c885d1b293dab3cd08fbe5ac55a2679a5a110cbcc794c88a4316da44ab0eac\" returns successfully" Dec 13 14:07:44.169139 env[1454]: time="2024-12-13T14:07:44.169074660Z" level=info msg="StartContainer for \"c588c515927dafa2850e78a529d0349642a086d12096906b339e4ebc89d039f6\" returns successfully" Dec 13 14:07:45.543888 kubelet[2131]: I1213 14:07:45.543821 2131 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:46.586000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.586000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4004ef29c0 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.586000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.587000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.587000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4004ef2a20 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.594000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.594000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=4001f9c200 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.594000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.594000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4e a1=400867d410 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.594000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.594000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4004ef2c30 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.594000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.595000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.595000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40016e05c0 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:07:46.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:07:46.841255 kubelet[2131]: E1213 14:07:46.841138 2131 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-02735da4ec\" not found" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:46.870000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.870000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006666f0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:46.870000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:46.871000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:46.871000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000cac060 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:46.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:46.924634 kubelet[2131]: I1213 14:07:46.924601 2131 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:46.924817 kubelet[2131]: E1213 14:07:46.924803 2131 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.6-a-02735da4ec\": node \"ci-3510.3.6-a-02735da4ec\" not found" Dec 13 14:07:47.324546 kubelet[2131]: I1213 14:07:47.324515 2131 apiserver.go:52] "Watching apiserver" Dec 13 14:07:47.334758 kubelet[2131]: I1213 14:07:47.334712 2131 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:07:48.924840 systemd[1]: Reloading. Dec 13 14:07:49.015711 /usr/lib/systemd/system-generators/torcx-generator[2423]: time="2024-12-13T14:07:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 14:07:49.016066 /usr/lib/systemd/system-generators/torcx-generator[2423]: time="2024-12-13T14:07:49Z" level=info msg="torcx already run" Dec 13 14:07:49.074283 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 14:07:49.074453 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 14:07:49.090475 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 14:07:49.204073 kernel: kauditd_printk_skb: 356 callbacks suppressed Dec 13 14:07:49.204363 kernel: audit: type=1400 audit(1734098869.179:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222596 kernel: audit: type=1400 audit(1734098869.179:582): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.264689 kernel: audit: type=1400 audit(1734098869.179:583): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.264808 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 14:07:49.264836 kernel: audit: type=1400 audit(1734098869.179:584): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.264872 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.293375 kernel: audit: type=1400 audit(1734098869.179:585): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.293497 kernel: audit: backlog limit exceeded Dec 13 14:07:49.293535 kernel: audit: type=1400 audit(1734098869.179:586): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.329623 kernel: audit: type=1400 audit(1734098869.179:587): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.179000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit: BPF prog-id=86 op=LOAD Dec 13 14:07:49.180000 audit: BPF prog-id=47 op=UNLOAD Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.180000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit: BPF prog-id=87 op=LOAD Dec 13 14:07:49.185000 audit: BPF prog-id=48 op=UNLOAD Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.202000 audit: BPF prog-id=88 op=LOAD Dec 13 14:07:49.202000 audit: BPF prog-id=62 op=UNLOAD Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.205000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.221000 audit: BPF prog-id=89 op=LOAD Dec 13 14:07:49.221000 audit: BPF prog-id=67 op=UNLOAD Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.239000 audit: BPF prog-id=90 op=LOAD Dec 13 14:07:49.239000 audit: BPF prog-id=78 op=UNLOAD Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.310000 audit: BPF prog-id=91 op=LOAD Dec 13 14:07:49.310000 audit: BPF prog-id=49 op=UNLOAD Dec 13 14:07:49.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit: BPF prog-id=92 op=LOAD Dec 13 14:07:49.330000 audit: BPF prog-id=50 op=UNLOAD Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.330000 audit: BPF prog-id=93 op=LOAD Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.331000 audit: BPF prog-id=94 op=LOAD Dec 13 14:07:49.331000 audit: BPF prog-id=51 op=UNLOAD Dec 13 14:07:49.331000 audit: BPF prog-id=52 op=UNLOAD Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.333000 audit: BPF prog-id=95 op=LOAD Dec 13 14:07:49.333000 audit: BPF prog-id=82 op=UNLOAD Dec 13 14:07:49.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.334000 audit: BPF prog-id=96 op=LOAD Dec 13 14:07:49.334000 audit: BPF prog-id=53 op=UNLOAD Dec 13 14:07:49.334000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit: BPF prog-id=97 op=LOAD Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.335000 audit: BPF prog-id=98 op=LOAD Dec 13 14:07:49.335000 audit: BPF prog-id=54 op=UNLOAD Dec 13 14:07:49.335000 audit: BPF prog-id=55 op=UNLOAD Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit: BPF prog-id=99 op=LOAD Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit: BPF prog-id=100 op=LOAD Dec 13 14:07:49.336000 audit: BPF prog-id=56 op=UNLOAD Dec 13 14:07:49.336000 audit: BPF prog-id=57 op=UNLOAD Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.336000 audit: BPF prog-id=101 op=LOAD Dec 13 14:07:49.336000 audit: BPF prog-id=66 op=UNLOAD Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.337000 audit: BPF prog-id=102 op=LOAD Dec 13 14:07:49.337000 audit: BPF prog-id=74 op=UNLOAD Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.339000 audit: BPF prog-id=103 op=LOAD Dec 13 14:07:49.339000 audit: BPF prog-id=58 op=UNLOAD Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit: BPF prog-id=104 op=LOAD Dec 13 14:07:49.340000 audit: BPF prog-id=59 op=UNLOAD Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit: BPF prog-id=105 op=LOAD Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.340000 audit: BPF prog-id=106 op=LOAD Dec 13 14:07:49.340000 audit: BPF prog-id=60 op=UNLOAD Dec 13 14:07:49.340000 audit: BPF prog-id=61 op=UNLOAD Dec 13 14:07:49.354371 systemd[1]: Stopping kubelet.service... Dec 13 14:07:49.380627 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 14:07:49.380813 systemd[1]: Stopped kubelet.service. Dec 13 14:07:49.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:49.380873 systemd[1]: kubelet.service: Consumed 1.662s CPU time. Dec 13 14:07:49.384117 systemd[1]: Starting kubelet.service... Dec 13 14:07:49.465617 systemd[1]: Started kubelet.service. Dec 13 14:07:49.465000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:49.513603 kubelet[2484]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:49.513603 kubelet[2484]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 14:07:49.513603 kubelet[2484]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 14:07:49.513603 kubelet[2484]: I1213 14:07:49.508375 2484 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 14:07:49.527088 kubelet[2484]: I1213 14:07:49.527046 2484 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 14:07:49.527088 kubelet[2484]: I1213 14:07:49.527077 2484 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 14:07:49.527386 kubelet[2484]: I1213 14:07:49.527329 2484 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 14:07:49.528928 kubelet[2484]: I1213 14:07:49.528888 2484 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 14:07:49.533261 kubelet[2484]: I1213 14:07:49.533230 2484 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 14:07:49.538045 kubelet[2484]: E1213 14:07:49.538013 2484 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 14:07:49.538452 kubelet[2484]: I1213 14:07:49.538435 2484 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 14:07:49.542370 kubelet[2484]: I1213 14:07:49.542349 2484 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 14:07:49.542635 kubelet[2484]: I1213 14:07:49.542623 2484 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 14:07:49.542798 kubelet[2484]: I1213 14:07:49.542770 2484 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 14:07:49.543032 kubelet[2484]: I1213 14:07:49.542854 2484 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-02735da4ec","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 14:07:49.543259 kubelet[2484]: I1213 14:07:49.543244 2484 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 14:07:49.543334 kubelet[2484]: I1213 14:07:49.543325 2484 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 14:07:49.543428 kubelet[2484]: I1213 14:07:49.543419 2484 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:49.543587 kubelet[2484]: I1213 14:07:49.543577 2484 kubelet.go:408] "Attempting to sync node with API server" Dec 13 14:07:49.543661 kubelet[2484]: I1213 14:07:49.543651 2484 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 14:07:49.543730 kubelet[2484]: I1213 14:07:49.543721 2484 kubelet.go:314] "Adding apiserver pod source" Dec 13 14:07:49.543790 kubelet[2484]: I1213 14:07:49.543781 2484 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 14:07:49.551763 kubelet[2484]: I1213 14:07:49.550112 2484 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 14:07:49.551763 kubelet[2484]: I1213 14:07:49.550711 2484 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 14:07:49.551763 kubelet[2484]: I1213 14:07:49.551165 2484 server.go:1269] "Started kubelet" Dec 13 14:07:49.562000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:49.562000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d2e300 a1=4000c407c8 a2=4000d2e2d0 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:49.564049 kubelet[2484]: I1213 14:07:49.564020 2484 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 14:07:49.562000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:49.562000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c22a40 a1=4000c407e0 a2=4000d2e390 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:49.564343 kubelet[2484]: I1213 14:07:49.564142 2484 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 14:07:49.564422 kubelet[2484]: I1213 14:07:49.564413 2484 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 14:07:49.564961 kubelet[2484]: I1213 14:07:49.564932 2484 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 14:07:49.566078 kubelet[2484]: I1213 14:07:49.566060 2484 server.go:460] "Adding debug handlers to kubelet server" Dec 13 14:07:49.567994 kubelet[2484]: I1213 14:07:49.567253 2484 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 14:07:49.568391 kubelet[2484]: I1213 14:07:49.568370 2484 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 14:07:49.569537 kubelet[2484]: I1213 14:07:49.569513 2484 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 14:07:49.570180 kubelet[2484]: I1213 14:07:49.570168 2484 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 14:07:49.572232 kubelet[2484]: E1213 14:07:49.572186 2484 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-02735da4ec\" not found" Dec 13 14:07:49.573527 kubelet[2484]: I1213 14:07:49.573511 2484 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 14:07:49.573763 kubelet[2484]: I1213 14:07:49.573753 2484 reconciler.go:26] "Reconciler: start to sync state" Dec 13 14:07:49.580452 kubelet[2484]: I1213 14:07:49.580422 2484 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 14:07:49.586042 kubelet[2484]: I1213 14:07:49.586014 2484 factory.go:221] Registration of the containerd container factory successfully Dec 13 14:07:49.586553 kubelet[2484]: I1213 14:07:49.586539 2484 factory.go:221] Registration of the systemd container factory successfully Dec 13 14:07:49.600734 kubelet[2484]: I1213 14:07:49.600696 2484 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 14:07:49.601706 kubelet[2484]: I1213 14:07:49.601690 2484 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 14:07:49.601805 kubelet[2484]: I1213 14:07:49.601795 2484 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 14:07:49.601875 kubelet[2484]: I1213 14:07:49.601866 2484 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 14:07:49.601969 kubelet[2484]: E1213 14:07:49.601954 2484 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 14:07:49.641611 kubelet[2484]: I1213 14:07:49.641535 2484 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 14:07:49.641611 kubelet[2484]: I1213 14:07:49.641556 2484 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 14:07:49.641611 kubelet[2484]: I1213 14:07:49.641578 2484 state_mem.go:36] "Initialized new in-memory state store" Dec 13 14:07:49.642022 kubelet[2484]: I1213 14:07:49.641761 2484 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 14:07:49.642084 kubelet[2484]: I1213 14:07:49.642034 2484 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 14:07:49.642084 kubelet[2484]: I1213 14:07:49.642061 2484 policy_none.go:49] "None policy: Start" Dec 13 14:07:49.643041 kubelet[2484]: I1213 14:07:49.643025 2484 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 14:07:49.643160 kubelet[2484]: I1213 14:07:49.643150 2484 state_mem.go:35] "Initializing new in-memory state store" Dec 13 14:07:49.643417 kubelet[2484]: I1213 14:07:49.643402 2484 state_mem.go:75] "Updated machine memory state" Dec 13 14:07:49.647247 kubelet[2484]: I1213 14:07:49.647192 2484 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 14:07:49.646000 audit[2484]: AVC avc: denied { mac_admin } for pid=2484 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:49.646000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 14:07:49.646000 audit[2484]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ac2270 a1=4001153188 a2=4000ac2210 a3=25 items=0 ppid=1 pid=2484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:49.646000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 14:07:49.647491 kubelet[2484]: I1213 14:07:49.647304 2484 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 14:07:49.647491 kubelet[2484]: I1213 14:07:49.647434 2484 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 14:07:49.647491 kubelet[2484]: I1213 14:07:49.647445 2484 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 14:07:49.648722 kubelet[2484]: I1213 14:07:49.648029 2484 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 14:07:49.716801 kubelet[2484]: W1213 14:07:49.716751 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:49.720795 kubelet[2484]: W1213 14:07:49.720271 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:49.720795 kubelet[2484]: W1213 14:07:49.720501 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:49.752178 kubelet[2484]: I1213 14:07:49.752142 2484 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.765857 kubelet[2484]: I1213 14:07:49.765747 2484 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.765857 kubelet[2484]: I1213 14:07:49.765839 2484 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875555 kubelet[2484]: I1213 14:07:49.875510 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875555 kubelet[2484]: I1213 14:07:49.875556 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875744 kubelet[2484]: I1213 14:07:49.875576 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/556a6a714cee921607370cc25c86d6a2-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-02735da4ec\" (UID: \"556a6a714cee921607370cc25c86d6a2\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875744 kubelet[2484]: I1213 14:07:49.875594 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875744 kubelet[2484]: I1213 14:07:49.875611 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875744 kubelet[2484]: I1213 14:07:49.875626 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875744 kubelet[2484]: I1213 14:07:49.875641 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c852b0cd0c70d259567990f0e6b476d0-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" (UID: \"c852b0cd0c70d259567990f0e6b476d0\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875874 kubelet[2484]: I1213 14:07:49.875656 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:49.875874 kubelet[2484]: I1213 14:07:49.875672 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7e83ad2343288ff0d439be2ddf58bf03-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-02735da4ec\" (UID: \"7e83ad2343288ff0d439be2ddf58bf03\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:50.545309 kubelet[2484]: I1213 14:07:50.545267 2484 apiserver.go:52] "Watching apiserver" Dec 13 14:07:50.574288 kubelet[2484]: I1213 14:07:50.574242 2484 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 14:07:50.660316 kubelet[2484]: W1213 14:07:50.660276 2484 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 14:07:50.660461 kubelet[2484]: E1213 14:07:50.660346 2484 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-02735da4ec\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" Dec 13 14:07:50.674150 kubelet[2484]: I1213 14:07:50.674086 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-02735da4ec" podStartSLOduration=1.6740673830000001 podStartE2EDuration="1.674067383s" podCreationTimestamp="2024-12-13 14:07:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:50.656151751 +0000 UTC m=+1.183697324" watchObservedRunningTime="2024-12-13 14:07:50.674067383 +0000 UTC m=+1.201612956" Dec 13 14:07:50.694433 kubelet[2484]: I1213 14:07:50.694370 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-02735da4ec" podStartSLOduration=1.694352936 podStartE2EDuration="1.694352936s" podCreationTimestamp="2024-12-13 14:07:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:50.674637333 +0000 UTC m=+1.202182906" watchObservedRunningTime="2024-12-13 14:07:50.694352936 +0000 UTC m=+1.221898509" Dec 13 14:07:50.715059 kubelet[2484]: I1213 14:07:50.715006 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-02735da4ec" podStartSLOduration=1.714977164 podStartE2EDuration="1.714977164s" podCreationTimestamp="2024-12-13 14:07:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:50.695104244 +0000 UTC m=+1.222649857" watchObservedRunningTime="2024-12-13 14:07:50.714977164 +0000 UTC m=+1.242522737" Dec 13 14:07:51.718000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:51.718000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e7b4a0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:51.718000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:51.719000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:51.719000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e7b660 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:51.719000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:51.720000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:51.720000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e7b820 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:51.720000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:51.743000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:07:51.743000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000e7bb80 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:51.743000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:53.505000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521012 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 14:07:53.505000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001531240 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:07:53.505000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:07:54.500957 kubelet[2484]: I1213 14:07:54.500928 2484 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 14:07:54.501893 env[1454]: time="2024-12-13T14:07:54.501797188Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 14:07:54.502297 kubelet[2484]: I1213 14:07:54.502276 2484 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 14:07:54.541824 sudo[1876]: pam_unix(sudo:session): session closed for user root Dec 13 14:07:54.574917 kernel: kauditd_printk_skb: 281 callbacks suppressed Dec 13 14:07:54.575083 kernel: audit: type=1106 audit(1734098874.540:826): pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:54.540000 audit[1876]: USER_END pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:54.540000 audit[1876]: CRED_DISP pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:54.604476 kernel: audit: type=1104 audit(1734098874.540:827): pid=1876 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 14:07:54.674289 sshd[1873]: pam_unix(sshd:session): session closed for user core Dec 13 14:07:54.674000 audit[1873]: USER_END pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:54.677698 systemd-logind[1444]: Session 9 logged out. Waiting for processes to exit. Dec 13 14:07:54.678846 systemd[1]: sshd@6-10.200.20.33:22-10.200.16.10:47474.service: Deactivated successfully. Dec 13 14:07:54.679665 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 14:07:54.679810 systemd[1]: session-9.scope: Consumed 5.098s CPU time. Dec 13 14:07:54.680828 systemd-logind[1444]: Removed session 9. Dec 13 14:07:54.674000 audit[1873]: CRED_DISP pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:54.724497 kernel: audit: type=1106 audit(1734098874.674:828): pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:54.724625 kernel: audit: type=1104 audit(1734098874.674:829): pid=1873 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:07:54.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.16.10:47474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:54.746911 kernel: audit: type=1131 audit(1734098874.677:830): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.33:22-10.200.16.10:47474 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:07:55.186964 systemd[1]: Created slice kubepods-besteffort-pod11014357_2cdd_4104_b091_1161b6283dea.slice. Dec 13 14:07:55.306405 kubelet[2484]: I1213 14:07:55.306357 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8v6lz\" (UniqueName: \"kubernetes.io/projected/11014357-2cdd-4104-b091-1161b6283dea-kube-api-access-8v6lz\") pod \"kube-proxy-2xhct\" (UID: \"11014357-2cdd-4104-b091-1161b6283dea\") " pod="kube-system/kube-proxy-2xhct" Dec 13 14:07:55.306618 kubelet[2484]: I1213 14:07:55.306406 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/11014357-2cdd-4104-b091-1161b6283dea-kube-proxy\") pod \"kube-proxy-2xhct\" (UID: \"11014357-2cdd-4104-b091-1161b6283dea\") " pod="kube-system/kube-proxy-2xhct" Dec 13 14:07:55.306618 kubelet[2484]: I1213 14:07:55.306438 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/11014357-2cdd-4104-b091-1161b6283dea-xtables-lock\") pod \"kube-proxy-2xhct\" (UID: \"11014357-2cdd-4104-b091-1161b6283dea\") " pod="kube-system/kube-proxy-2xhct" Dec 13 14:07:55.306618 kubelet[2484]: I1213 14:07:55.306455 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/11014357-2cdd-4104-b091-1161b6283dea-lib-modules\") pod \"kube-proxy-2xhct\" (UID: \"11014357-2cdd-4104-b091-1161b6283dea\") " pod="kube-system/kube-proxy-2xhct" Dec 13 14:07:55.414152 kubelet[2484]: I1213 14:07:55.414120 2484 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 14:07:55.497460 env[1454]: time="2024-12-13T14:07:55.497328574Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2xhct,Uid:11014357-2cdd-4104-b091-1161b6283dea,Namespace:kube-system,Attempt:0,}" Dec 13 14:07:55.538272 env[1454]: time="2024-12-13T14:07:55.536445416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:55.538272 env[1454]: time="2024-12-13T14:07:55.536479176Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:55.538272 env[1454]: time="2024-12-13T14:07:55.536488975Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:55.538272 env[1454]: time="2024-12-13T14:07:55.536586974Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80 pid=2561 runtime=io.containerd.runc.v2 Dec 13 14:07:55.566939 systemd[1]: run-containerd-runc-k8s.io-c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80-runc.ZH4NKP.mount: Deactivated successfully. Dec 13 14:07:55.568628 systemd[1]: Started cri-containerd-c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80.scope. Dec 13 14:07:55.586109 systemd[1]: Created slice kubepods-besteffort-podc432efb2_f223_4c84_8ca6_736422f88d29.slice. Dec 13 14:07:55.608484 kubelet[2484]: I1213 14:07:55.608437 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7b4lt\" (UniqueName: \"kubernetes.io/projected/c432efb2-f223-4c84-8ca6-736422f88d29-kube-api-access-7b4lt\") pod \"tigera-operator-76c4976dd7-4zlkr\" (UID: \"c432efb2-f223-4c84-8ca6-736422f88d29\") " pod="tigera-operator/tigera-operator-76c4976dd7-4zlkr" Dec 13 14:07:55.608484 kubelet[2484]: I1213 14:07:55.608483 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c432efb2-f223-4c84-8ca6-736422f88d29-var-lib-calico\") pod \"tigera-operator-76c4976dd7-4zlkr\" (UID: \"c432efb2-f223-4c84-8ca6-736422f88d29\") " pod="tigera-operator/tigera-operator-76c4976dd7-4zlkr" Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.647227 kernel: audit: type=1400 audit(1734098875.610:831): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.647346 kernel: audit: type=1400 audit(1734098875.610:832): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.666777 kernel: audit: type=1400 audit(1734098875.610:833): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.691177 kernel: audit: type=1400 audit(1734098875.610:834): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.709044 kernel: audit: type=1400 audit(1734098875.610:835): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit: BPF prog-id=107 op=LOAD Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2561 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313339303830626233393231616466326266313664613234353065 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2561 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313339303830626233393231616466326266313664613234353065 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.610000 audit: BPF prog-id=108 op=LOAD Dec 13 14:07:55.610000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2561 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313339303830626233393231616466326266313664613234353065 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit: BPF prog-id=109 op=LOAD Dec 13 14:07:55.629000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2561 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313339303830626233393231616466326266313664613234353065 Dec 13 14:07:55.629000 audit: BPF prog-id=109 op=UNLOAD Dec 13 14:07:55.629000 audit: BPF prog-id=108 op=UNLOAD Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { perfmon } for pid=2569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit[2569]: AVC avc: denied { bpf } for pid=2569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.629000 audit: BPF prog-id=110 op=LOAD Dec 13 14:07:55.629000 audit[2569]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2561 pid=2569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.629000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313339303830626233393231616466326266313664613234353065 Dec 13 14:07:55.721116 env[1454]: time="2024-12-13T14:07:55.721073102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2xhct,Uid:11014357-2cdd-4104-b091-1161b6283dea,Namespace:kube-system,Attempt:0,} returns sandbox id \"c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80\"" Dec 13 14:07:55.725680 env[1454]: time="2024-12-13T14:07:55.725648037Z" level=info msg="CreateContainer within sandbox \"c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 14:07:55.768115 env[1454]: time="2024-12-13T14:07:55.766291737Z" level=info msg="CreateContainer within sandbox \"c7139080bb3921adf2bf16da2450e5453d4e8bebffd509d52382972f35607b80\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3a9836063a7d8a8d398ea1c8348ac65186f8de4e89c4e17f27c57fa2dd93352f\"" Dec 13 14:07:55.773407 env[1454]: time="2024-12-13T14:07:55.773348157Z" level=info msg="StartContainer for \"3a9836063a7d8a8d398ea1c8348ac65186f8de4e89c4e17f27c57fa2dd93352f\"" Dec 13 14:07:55.789958 systemd[1]: Started cri-containerd-3a9836063a7d8a8d398ea1c8348ac65186f8de4e89c4e17f27c57fa2dd93352f.scope. Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2561 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361393833363036336137643861386433393865613163383334386163 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit: BPF prog-id=111 op=LOAD Dec 13 14:07:55.806000 audit[2602]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2561 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361393833363036336137643861386433393865613163383334386163 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.806000 audit: BPF prog-id=112 op=LOAD Dec 13 14:07:55.806000 audit[2602]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2561 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361393833363036336137643861386433393865613163383334386163 Dec 13 14:07:55.807000 audit: BPF prog-id=112 op=UNLOAD Dec 13 14:07:55.807000 audit: BPF prog-id=111 op=UNLOAD Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { perfmon } for pid=2602 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit[2602]: AVC avc: denied { bpf } for pid=2602 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.807000 audit: BPF prog-id=113 op=LOAD Dec 13 14:07:55.807000 audit[2602]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2561 pid=2602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.807000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3361393833363036336137643861386433393865613163383334386163 Dec 13 14:07:55.824802 env[1454]: time="2024-12-13T14:07:55.824755143Z" level=info msg="StartContainer for \"3a9836063a7d8a8d398ea1c8348ac65186f8de4e89c4e17f27c57fa2dd93352f\" returns successfully" Dec 13 14:07:55.890009 env[1454]: time="2024-12-13T14:07:55.889962933Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-4zlkr,Uid:c432efb2-f223-4c84-8ca6-736422f88d29,Namespace:tigera-operator,Attempt:0,}" Dec 13 14:07:55.944388 env[1454]: time="2024-12-13T14:07:55.944181639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:07:55.944388 env[1454]: time="2024-12-13T14:07:55.944240839Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:07:55.944388 env[1454]: time="2024-12-13T14:07:55.944250919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:07:55.944593 env[1454]: time="2024-12-13T14:07:55.944434196Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5230235c893a5f6fb297a531e30cff630a2c66f67a891f617e8748779efcdf27 pid=2638 runtime=io.containerd.runc.v2 Dec 13 14:07:55.960115 systemd[1]: Started cri-containerd-5230235c893a5f6fb297a531e30cff630a2c66f67a891f617e8748779efcdf27.scope. Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit: BPF prog-id=114 op=LOAD Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333032333563383933613566366662323937613533316533306366 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333032333563383933613566366662323937613533316533306366 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.973000 audit: BPF prog-id=115 op=LOAD Dec 13 14:07:55.973000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.973000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333032333563383933613566366662323937613533316533306366 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.975000 audit: BPF prog-id=116 op=LOAD Dec 13 14:07:55.975000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.975000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333032333563383933613566366662323937613533316533306366 Dec 13 14:07:55.976000 audit: BPF prog-id=116 op=UNLOAD Dec 13 14:07:55.976000 audit: BPF prog-id=115 op=UNLOAD Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { perfmon } for pid=2649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit[2649]: AVC avc: denied { bpf } for pid=2649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:55.976000 audit: BPF prog-id=117 op=LOAD Dec 13 14:07:55.976000 audit[2649]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2638 pid=2649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:55.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532333032333563383933613566366662323937613533316533306366 Dec 13 14:07:56.000808 env[1454]: time="2024-12-13T14:07:56.000766112Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-4zlkr,Uid:c432efb2-f223-4c84-8ca6-736422f88d29,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"5230235c893a5f6fb297a531e30cff630a2c66f67a891f617e8748779efcdf27\"" Dec 13 14:07:56.003034 env[1454]: time="2024-12-13T14:07:56.002995761Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 14:07:56.041000 audit[2703]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2703 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.041000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffa8428e0 a2=0 a3=1 items=0 ppid=2613 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.041000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:07:56.043000 audit[2704]: NETFILTER_CFG table=nat:43 family=10 entries=1 op=nft_register_chain pid=2704 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.043000 audit[2704]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1dd2480 a2=0 a3=1 items=0 ppid=2613 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:07:56.050000 audit[2705]: NETFILTER_CFG table=mangle:44 family=2 entries=1 op=nft_register_chain pid=2705 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.050000 audit[2705]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe7dc1020 a2=0 a3=1 items=0 ppid=2613 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.050000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 14:07:56.050000 audit[2707]: NETFILTER_CFG table=filter:45 family=10 entries=1 op=nft_register_chain pid=2707 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.050000 audit[2707]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd668230 a2=0 a3=1 items=0 ppid=2613 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.050000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:07:56.051000 audit[2708]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.051000 audit[2708]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1c11370 a2=0 a3=1 items=0 ppid=2613 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 14:07:56.052000 audit[2709]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.052000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6a5bce0 a2=0 a3=1 items=0 ppid=2613 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.052000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 14:07:56.146000 audit[2710]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.146000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd6df1ea0 a2=0 a3=1 items=0 ppid=2613 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:07:56.149000 audit[2712]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.149000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffcb24df30 a2=0 a3=1 items=0 ppid=2613 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.149000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 14:07:56.152000 audit[2715]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.152000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=fffffaa99f50 a2=0 a3=1 items=0 ppid=2613 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.152000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 14:07:56.153000 audit[2716]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.153000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffcb698b0 a2=0 a3=1 items=0 ppid=2613 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.153000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:07:56.156000 audit[2718]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.156000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdeeda5d0 a2=0 a3=1 items=0 ppid=2613 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.156000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:07:56.158000 audit[2719]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.158000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff6549120 a2=0 a3=1 items=0 ppid=2613 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.158000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:07:56.160000 audit[2721]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.160000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff48eaea0 a2=0 a3=1 items=0 ppid=2613 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.160000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:07:56.165000 audit[2724]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.165000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffca9ad120 a2=0 a3=1 items=0 ppid=2613 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.165000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 14:07:56.166000 audit[2725]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2725 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.166000 audit[2725]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcb42b240 a2=0 a3=1 items=0 ppid=2613 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.166000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:07:56.168000 audit[2727]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.168000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd71b92e0 a2=0 a3=1 items=0 ppid=2613 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:07:56.170000 audit[2728]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.170000 audit[2728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1916dc0 a2=0 a3=1 items=0 ppid=2613 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.170000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:07:56.172000 audit[2730]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.172000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcd52a890 a2=0 a3=1 items=0 ppid=2613 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.172000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:56.176000 audit[2733]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.176000 audit[2733]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd99d6290 a2=0 a3=1 items=0 ppid=2613 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.176000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:56.179000 audit[2736]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.179000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffb3fd030 a2=0 a3=1 items=0 ppid=2613 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:07:56.180000 audit[2737]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.180000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffca367560 a2=0 a3=1 items=0 ppid=2613 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.180000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:07:56.183000 audit[2739]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.183000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffc7fb6c60 a2=0 a3=1 items=0 ppid=2613 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.183000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:56.187000 audit[2742]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.187000 audit[2742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcf8f26e0 a2=0 a3=1 items=0 ppid=2613 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:56.188000 audit[2743]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.188000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc3826ca0 a2=0 a3=1 items=0 ppid=2613 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:07:56.190000 audit[2745]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 14:07:56.190000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff584fa70 a2=0 a3=1 items=0 ppid=2613 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.190000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:07:56.284000 audit[2751]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.284000 audit[2751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5248 a0=3 a1=ffffd829d550 a2=0 a3=1 items=0 ppid=2613 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.284000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.312000 audit[2751]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2751 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:07:56.312000 audit[2751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd829d550 a2=0 a3=1 items=0 ppid=2613 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.313000 audit[2756]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.313000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd86a5f30 a2=0 a3=1 items=0 ppid=2613 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 14:07:56.316000 audit[2758]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.316000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdb5d2840 a2=0 a3=1 items=0 ppid=2613 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.316000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 14:07:56.320000 audit[2761]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.320000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff692fbf0 a2=0 a3=1 items=0 ppid=2613 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.320000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 14:07:56.321000 audit[2762]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.321000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd58aa9a0 a2=0 a3=1 items=0 ppid=2613 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 14:07:56.323000 audit[2764]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.323000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6af1b50 a2=0 a3=1 items=0 ppid=2613 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.323000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 14:07:56.324000 audit[2765]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2765 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.324000 audit[2765]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd54ded0 a2=0 a3=1 items=0 ppid=2613 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.324000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 14:07:56.326000 audit[2767]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.326000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffecbc06a0 a2=0 a3=1 items=0 ppid=2613 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.326000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 14:07:56.329000 audit[2770]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.329000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffff4860010 a2=0 a3=1 items=0 ppid=2613 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 14:07:56.330000 audit[2771]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.330000 audit[2771]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2578a60 a2=0 a3=1 items=0 ppid=2613 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.330000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 14:07:56.333000 audit[2773]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.333000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeb6a4a80 a2=0 a3=1 items=0 ppid=2613 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.333000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 14:07:56.334000 audit[2774]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2774 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.334000 audit[2774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc655c060 a2=0 a3=1 items=0 ppid=2613 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.334000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 14:07:56.336000 audit[2776]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.336000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeee9a730 a2=0 a3=1 items=0 ppid=2613 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.336000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 14:07:56.339000 audit[2779]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2779 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.339000 audit[2779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd08fcdb0 a2=0 a3=1 items=0 ppid=2613 pid=2779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.339000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 14:07:56.342000 audit[2782]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.342000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff59d1070 a2=0 a3=1 items=0 ppid=2613 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.342000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 14:07:56.344000 audit[2783]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2783 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.344000 audit[2783]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffb448fa0 a2=0 a3=1 items=0 ppid=2613 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.344000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 14:07:56.346000 audit[2785]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.346000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd8b099d0 a2=0 a3=1 items=0 ppid=2613 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.346000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:56.349000 audit[2788]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2788 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.349000 audit[2788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc5bf4a80 a2=0 a3=1 items=0 ppid=2613 pid=2788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.349000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 14:07:56.350000 audit[2789]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2789 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.350000 audit[2789]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0555bb0 a2=0 a3=1 items=0 ppid=2613 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.350000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 14:07:56.352000 audit[2791]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2791 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.352000 audit[2791]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffffbba33b0 a2=0 a3=1 items=0 ppid=2613 pid=2791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.352000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 14:07:56.353000 audit[2792]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2792 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.353000 audit[2792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc780b820 a2=0 a3=1 items=0 ppid=2613 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.353000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 14:07:56.355000 audit[2794]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.355000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe0a1e850 a2=0 a3=1 items=0 ppid=2613 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.355000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:56.358000 audit[2797]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2797 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 14:07:56.358000 audit[2797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6d8a330 a2=0 a3=1 items=0 ppid=2613 pid=2797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.358000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 14:07:56.361000 audit[2799]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:07:56.361000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2088 a0=3 a1=ffffc428ab80 a2=0 a3=1 items=0 ppid=2613 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.361000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.361000 audit[2799]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 14:07:56.361000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffc428ab80 a2=0 a3=1 items=0 ppid=2613 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:56.361000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:07:56.664981 kubelet[2484]: I1213 14:07:56.664708 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-2xhct" podStartSLOduration=1.6646895430000002 podStartE2EDuration="1.664689543s" podCreationTimestamp="2024-12-13 14:07:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:07:56.664468506 +0000 UTC m=+7.192014079" watchObservedRunningTime="2024-12-13 14:07:56.664689543 +0000 UTC m=+7.192235116" Dec 13 14:07:57.755965 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2142242565.mount: Deactivated successfully. Dec 13 14:07:58.271710 env[1454]: time="2024-12-13T14:07:58.271667052Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.277786 env[1454]: time="2024-12-13T14:07:58.277745811Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.281811 env[1454]: time="2024-12-13T14:07:58.281775638Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.286728 env[1454]: time="2024-12-13T14:07:58.286690652Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:07:58.287465 env[1454]: time="2024-12-13T14:07:58.287439122Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:30d521e4e84764b396aacbb2a373ca7a573f84571e3955b34329652acccfb73c\"" Dec 13 14:07:58.290370 env[1454]: time="2024-12-13T14:07:58.290320444Z" level=info msg="CreateContainer within sandbox \"5230235c893a5f6fb297a531e30cff630a2c66f67a891f617e8748779efcdf27\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 14:07:58.316332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2595289113.mount: Deactivated successfully. Dec 13 14:07:58.331279 env[1454]: time="2024-12-13T14:07:58.331174341Z" level=info msg="CreateContainer within sandbox \"5230235c893a5f6fb297a531e30cff630a2c66f67a891f617e8748779efcdf27\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"50b5188c7f2a61ebe13adae1e0cdd1fdadbc4cd2576b1ff69db0a160f8e9cf34\"" Dec 13 14:07:58.331957 env[1454]: time="2024-12-13T14:07:58.331930331Z" level=info msg="StartContainer for \"50b5188c7f2a61ebe13adae1e0cdd1fdadbc4cd2576b1ff69db0a160f8e9cf34\"" Dec 13 14:07:58.351453 systemd[1]: Started cri-containerd-50b5188c7f2a61ebe13adae1e0cdd1fdadbc4cd2576b1ff69db0a160f8e9cf34.scope. Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.365000 audit: BPF prog-id=118 op=LOAD Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2638 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623531383863376632613631656265313361646165316530636464 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2638 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623531383863376632613631656265313361646165316530636464 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.366000 audit: BPF prog-id=119 op=LOAD Dec 13 14:07:58.366000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2638 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.366000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623531383863376632613631656265313361646165316530636464 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.367000 audit: BPF prog-id=120 op=LOAD Dec 13 14:07:58.367000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2638 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.367000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623531383863376632613631656265313361646165316530636464 Dec 13 14:07:58.368000 audit: BPF prog-id=120 op=UNLOAD Dec 13 14:07:58.368000 audit: BPF prog-id=119 op=UNLOAD Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { perfmon } for pid=2808 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit[2808]: AVC avc: denied { bpf } for pid=2808 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:07:58.368000 audit: BPF prog-id=121 op=LOAD Dec 13 14:07:58.368000 audit[2808]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2638 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:07:58.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530623531383863376632613631656265313361646165316530636464 Dec 13 14:07:58.387609 env[1454]: time="2024-12-13T14:07:58.387559951Z" level=info msg="StartContainer for \"50b5188c7f2a61ebe13adae1e0cdd1fdadbc4cd2576b1ff69db0a160f8e9cf34\" returns successfully" Dec 13 14:07:58.719425 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount237280016.mount: Deactivated successfully. Dec 13 14:07:59.810553 kubelet[2484]: I1213 14:07:59.810495 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-4zlkr" podStartSLOduration=2.524089946 podStartE2EDuration="4.810479481s" podCreationTimestamp="2024-12-13 14:07:55 +0000 UTC" firstStartedPulling="2024-12-13 14:07:56.00235521 +0000 UTC m=+6.529900783" lastFinishedPulling="2024-12-13 14:07:58.288744745 +0000 UTC m=+8.816290318" observedRunningTime="2024-12-13 14:07:58.667030716 +0000 UTC m=+9.194576289" watchObservedRunningTime="2024-12-13 14:07:59.810479481 +0000 UTC m=+10.338025014" Dec 13 14:08:02.095259 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 14:08:02.095367 kernel: audit: type=1325 audit(1734098882.081:942): table=filter:93 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.081000 audit[2840]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.081000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc3aeabf0 a2=0 a3=1 items=0 ppid=2613 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.147673 kernel: audit: type=1300 audit(1734098882.081:942): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffc3aeabf0 a2=0 a3=1 items=0 ppid=2613 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.147786 kernel: audit: type=1327 audit(1734098882.081:942): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.105000 audit[2840]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.163749 kernel: audit: type=1325 audit(1734098882.105:943): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.105000 audit[2840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3aeabf0 a2=0 a3=1 items=0 ppid=2613 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.169379 kernel: audit: type=1300 audit(1734098882.105:943): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc3aeabf0 a2=0 a3=1 items=0 ppid=2613 pid=2840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.105000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.216098 kernel: audit: type=1327 audit(1734098882.105:943): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.198000 audit[2842]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.234049 kernel: audit: type=1325 audit(1734098882.198:944): table=filter:95 family=2 entries=16 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.234191 kernel: audit: type=1300 audit(1734098882.198:944): arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe7cc3800 a2=0 a3=1 items=0 ppid=2613 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.198000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5992 a0=3 a1=ffffe7cc3800 a2=0 a3=1 items=0 ppid=2613 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.277612 kernel: audit: type=1327 audit(1734098882.198:944): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.218000 audit[2842]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.299365 kernel: audit: type=1325 audit(1734098882.218:945): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2842 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:02.218000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe7cc3800 a2=0 a3=1 items=0 ppid=2613 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:02.538596 systemd[1]: Created slice kubepods-besteffort-pode60b8bb0_ce84_4a55_8dff_ebf380bb63e0.slice. Dec 13 14:08:02.563481 kubelet[2484]: I1213 14:08:02.563428 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j8g8h\" (UniqueName: \"kubernetes.io/projected/e60b8bb0-ce84-4a55-8dff-ebf380bb63e0-kube-api-access-j8g8h\") pod \"calico-typha-54b8d47f5-pjqvl\" (UID: \"e60b8bb0-ce84-4a55-8dff-ebf380bb63e0\") " pod="calico-system/calico-typha-54b8d47f5-pjqvl" Dec 13 14:08:02.563481 kubelet[2484]: I1213 14:08:02.563474 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e60b8bb0-ce84-4a55-8dff-ebf380bb63e0-tigera-ca-bundle\") pod \"calico-typha-54b8d47f5-pjqvl\" (UID: \"e60b8bb0-ce84-4a55-8dff-ebf380bb63e0\") " pod="calico-system/calico-typha-54b8d47f5-pjqvl" Dec 13 14:08:02.563831 kubelet[2484]: I1213 14:08:02.563496 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/e60b8bb0-ce84-4a55-8dff-ebf380bb63e0-typha-certs\") pod \"calico-typha-54b8d47f5-pjqvl\" (UID: \"e60b8bb0-ce84-4a55-8dff-ebf380bb63e0\") " pod="calico-system/calico-typha-54b8d47f5-pjqvl" Dec 13 14:08:02.634884 systemd[1]: Created slice kubepods-besteffort-pod62f49bd3_a59e_4ca6_9a87_66773d3f569e.slice. Dec 13 14:08:02.638109 kubelet[2484]: W1213 14:08:02.638064 2484 reflector.go:561] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510.3.6-a-02735da4ec" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-02735da4ec' and this object Dec 13 14:08:02.638248 kubelet[2484]: E1213 14:08:02.638115 2484 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"cni-config\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"cni-config\" is forbidden: User \"system:node:ci-3510.3.6-a-02735da4ec\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.6-a-02735da4ec' and this object" logger="UnhandledError" Dec 13 14:08:02.638333 kubelet[2484]: W1213 14:08:02.638317 2484 reflector.go:561] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510.3.6-a-02735da4ec" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510.3.6-a-02735da4ec' and this object Dec 13 14:08:02.638414 kubelet[2484]: E1213 14:08:02.638398 2484 reflector.go:158] "Unhandled Error" err="object-\"calico-system\"/\"node-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"node-certs\" is forbidden: User \"system:node:ci-3510.3.6-a-02735da4ec\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-system\": no relationship found between node 'ci-3510.3.6-a-02735da4ec' and this object" logger="UnhandledError" Dec 13 14:08:02.755751 kubelet[2484]: E1213 14:08:02.755701 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:02.764611 kubelet[2484]: I1213 14:08:02.764560 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-var-lib-calico\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764611 kubelet[2484]: I1213 14:08:02.764612 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-xtables-lock\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764793 kubelet[2484]: I1213 14:08:02.764629 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/62f49bd3-a59e-4ca6-9a87-66773d3f569e-node-certs\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764793 kubelet[2484]: I1213 14:08:02.764646 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-var-run-calico\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764793 kubelet[2484]: I1213 14:08:02.764664 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-policysync\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764793 kubelet[2484]: I1213 14:08:02.764680 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-lib-modules\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764793 kubelet[2484]: I1213 14:08:02.764699 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-cni-net-dir\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764905 kubelet[2484]: I1213 14:08:02.764715 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-flexvol-driver-host\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764905 kubelet[2484]: I1213 14:08:02.764735 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/62f49bd3-a59e-4ca6-9a87-66773d3f569e-tigera-ca-bundle\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764905 kubelet[2484]: I1213 14:08:02.764751 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-cni-bin-dir\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764905 kubelet[2484]: I1213 14:08:02.764766 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/62f49bd3-a59e-4ca6-9a87-66773d3f569e-cni-log-dir\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.764905 kubelet[2484]: I1213 14:08:02.764786 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rb98c\" (UniqueName: \"kubernetes.io/projected/62f49bd3-a59e-4ca6-9a87-66773d3f569e-kube-api-access-rb98c\") pod \"calico-node-r9l2v\" (UID: \"62f49bd3-a59e-4ca6-9a87-66773d3f569e\") " pod="calico-system/calico-node-r9l2v" Dec 13 14:08:02.842943 env[1454]: time="2024-12-13T14:08:02.842888283Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b8d47f5-pjqvl,Uid:e60b8bb0-ce84-4a55-8dff-ebf380bb63e0,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:02.865803 kubelet[2484]: I1213 14:08:02.865654 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/68671505-86de-4265-ad77-6c366467882e-registration-dir\") pod \"csi-node-driver-nrh6t\" (UID: \"68671505-86de-4265-ad77-6c366467882e\") " pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:02.866036 kubelet[2484]: I1213 14:08:02.866021 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-r4fzv\" (UniqueName: \"kubernetes.io/projected/68671505-86de-4265-ad77-6c366467882e-kube-api-access-r4fzv\") pod \"csi-node-driver-nrh6t\" (UID: \"68671505-86de-4265-ad77-6c366467882e\") " pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:02.866610 kubelet[2484]: E1213 14:08:02.866592 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.866698 kubelet[2484]: W1213 14:08:02.866684 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.866795 kubelet[2484]: E1213 14:08:02.866782 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.867372 kubelet[2484]: E1213 14:08:02.867347 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.867501 kubelet[2484]: W1213 14:08:02.867487 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.867574 kubelet[2484]: E1213 14:08:02.867563 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.867816 kubelet[2484]: E1213 14:08:02.867794 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.867816 kubelet[2484]: W1213 14:08:02.867812 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.867917 kubelet[2484]: E1213 14:08:02.867824 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.868111 kubelet[2484]: E1213 14:08:02.868094 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.868111 kubelet[2484]: W1213 14:08:02.868109 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.868222 kubelet[2484]: E1213 14:08:02.868126 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.868322 kubelet[2484]: E1213 14:08:02.868301 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.868322 kubelet[2484]: W1213 14:08:02.868317 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.868412 kubelet[2484]: E1213 14:08:02.868332 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.868582 kubelet[2484]: E1213 14:08:02.868566 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.868582 kubelet[2484]: W1213 14:08:02.868579 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.868678 kubelet[2484]: E1213 14:08:02.868593 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.868866 kubelet[2484]: E1213 14:08:02.868845 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.868866 kubelet[2484]: W1213 14:08:02.868863 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.868936 kubelet[2484]: E1213 14:08:02.868876 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.869141 kubelet[2484]: E1213 14:08:02.869122 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.869141 kubelet[2484]: W1213 14:08:02.869137 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.869313 kubelet[2484]: E1213 14:08:02.869153 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.869342 kubelet[2484]: E1213 14:08:02.869332 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.869364 kubelet[2484]: W1213 14:08:02.869341 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.869364 kubelet[2484]: E1213 14:08:02.869351 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.869584 kubelet[2484]: E1213 14:08:02.869567 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.869584 kubelet[2484]: W1213 14:08:02.869580 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.869708 kubelet[2484]: E1213 14:08:02.869692 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.869784 kubelet[2484]: E1213 14:08:02.869720 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.869784 kubelet[2484]: W1213 14:08:02.869778 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.869890 kubelet[2484]: E1213 14:08:02.869877 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.870536 kubelet[2484]: E1213 14:08:02.870280 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.870536 kubelet[2484]: W1213 14:08:02.870303 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.870536 kubelet[2484]: E1213 14:08:02.870324 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.870846 kubelet[2484]: E1213 14:08:02.870812 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.870846 kubelet[2484]: W1213 14:08:02.870843 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.870971 kubelet[2484]: E1213 14:08:02.870955 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.871238 kubelet[2484]: E1213 14:08:02.871019 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.871238 kubelet[2484]: W1213 14:08:02.871033 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.871382 kubelet[2484]: E1213 14:08:02.871362 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.871609 kubelet[2484]: E1213 14:08:02.871588 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.871609 kubelet[2484]: W1213 14:08:02.871607 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.871735 kubelet[2484]: E1213 14:08:02.871721 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.871917 kubelet[2484]: E1213 14:08:02.871783 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.871917 kubelet[2484]: W1213 14:08:02.871809 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.872055 kubelet[2484]: E1213 14:08:02.872036 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.872343 kubelet[2484]: E1213 14:08:02.872313 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.872409 kubelet[2484]: W1213 14:08:02.872344 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.872464 kubelet[2484]: E1213 14:08:02.872450 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.879644 kubelet[2484]: E1213 14:08:02.879491 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.879644 kubelet[2484]: W1213 14:08:02.879519 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.879864 kubelet[2484]: E1213 14:08:02.879836 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.882683 env[1454]: time="2024-12-13T14:08:02.882100487Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:02.882683 env[1454]: time="2024-12-13T14:08:02.882181246Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:02.882683 env[1454]: time="2024-12-13T14:08:02.882235205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:02.882683 env[1454]: time="2024-12-13T14:08:02.882392883Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea pid=2871 runtime=io.containerd.runc.v2 Dec 13 14:08:02.883343 kubelet[2484]: E1213 14:08:02.883281 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.883343 kubelet[2484]: W1213 14:08:02.883305 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.883522 kubelet[2484]: E1213 14:08:02.883502 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.883631 kubelet[2484]: I1213 14:08:02.883615 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/68671505-86de-4265-ad77-6c366467882e-kubelet-dir\") pod \"csi-node-driver-nrh6t\" (UID: \"68671505-86de-4265-ad77-6c366467882e\") " pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:02.883720 kubelet[2484]: E1213 14:08:02.883523 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.883787 kubelet[2484]: W1213 14:08:02.883776 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.889043 kubelet[2484]: E1213 14:08:02.886288 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.889613 kubelet[2484]: E1213 14:08:02.889594 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.889704 kubelet[2484]: W1213 14:08:02.889688 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.889917 kubelet[2484]: E1213 14:08:02.889903 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.890045 kubelet[2484]: E1213 14:08:02.890035 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.890119 kubelet[2484]: W1213 14:08:02.890107 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.892233 kubelet[2484]: E1213 14:08:02.890272 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.892426 kubelet[2484]: E1213 14:08:02.892400 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.892493 kubelet[2484]: W1213 14:08:02.892480 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.892654 kubelet[2484]: E1213 14:08:02.892641 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.892782 kubelet[2484]: E1213 14:08:02.892772 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.892863 kubelet[2484]: W1213 14:08:02.892852 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.892980 kubelet[2484]: E1213 14:08:02.892950 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.893222 kubelet[2484]: E1213 14:08:02.893177 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.893344 kubelet[2484]: W1213 14:08:02.893330 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.893471 kubelet[2484]: E1213 14:08:02.893446 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.894372 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895453 kubelet[2484]: W1213 14:08:02.894391 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.894693 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895453 kubelet[2484]: W1213 14:08:02.894707 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.894848 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895453 kubelet[2484]: W1213 14:08:02.894856 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.894961 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895453 kubelet[2484]: W1213 14:08:02.894967 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.895064 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895453 kubelet[2484]: W1213 14:08:02.895070 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895453 kubelet[2484]: E1213 14:08:02.895171 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895764 kubelet[2484]: W1213 14:08:02.895178 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895764 kubelet[2484]: E1213 14:08:02.895402 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895764 kubelet[2484]: W1213 14:08:02.895412 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895764 kubelet[2484]: E1213 14:08:02.895513 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895764 kubelet[2484]: W1213 14:08:02.895520 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895764 kubelet[2484]: E1213 14:08:02.895627 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895764 kubelet[2484]: W1213 14:08:02.895633 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895764 kubelet[2484]: E1213 14:08:02.895734 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895764 kubelet[2484]: W1213 14:08:02.895740 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895764 kubelet[2484]: E1213 14:08:02.895751 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.895973 kubelet[2484]: E1213 14:08:02.895902 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.895973 kubelet[2484]: W1213 14:08:02.895908 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.895973 kubelet[2484]: E1213 14:08:02.895916 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.895973 kubelet[2484]: E1213 14:08:02.895943 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896054 kubelet[2484]: E1213 14:08:02.896048 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.896075 kubelet[2484]: W1213 14:08:02.896055 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.896075 kubelet[2484]: E1213 14:08:02.896062 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896163 kubelet[2484]: E1213 14:08:02.896147 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896239 kubelet[2484]: E1213 14:08:02.896219 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896297 kubelet[2484]: E1213 14:08:02.896279 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896349 kubelet[2484]: E1213 14:08:02.896189 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.896429 kubelet[2484]: W1213 14:08:02.896400 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.896499 kubelet[2484]: E1213 14:08:02.896487 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896569 kubelet[2484]: E1213 14:08:02.896491 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.896643 kubelet[2484]: E1213 14:08:02.896497 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.897053 kubelet[2484]: E1213 14:08:02.896195 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.898308 kubelet[2484]: E1213 14:08:02.896503 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.898456 kubelet[2484]: I1213 14:08:02.898439 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/68671505-86de-4265-ad77-6c366467882e-varrun\") pod \"csi-node-driver-nrh6t\" (UID: \"68671505-86de-4265-ad77-6c366467882e\") " pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:02.898541 kubelet[2484]: E1213 14:08:02.896655 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.898614 kubelet[2484]: W1213 14:08:02.898599 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.898678 kubelet[2484]: E1213 14:08:02.898666 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.898897 kubelet[2484]: E1213 14:08:02.896510 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.903672 kubelet[2484]: E1213 14:08:02.903639 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.903880 kubelet[2484]: W1213 14:08:02.903863 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.907236 kubelet[2484]: E1213 14:08:02.904410 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.908790 systemd[1]: Started cri-containerd-6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea.scope. Dec 13 14:08:02.913353 kubelet[2484]: E1213 14:08:02.913334 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.913483 kubelet[2484]: W1213 14:08:02.913468 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.913613 kubelet[2484]: E1213 14:08:02.913588 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.919031 kubelet[2484]: E1213 14:08:02.919008 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.919185 kubelet[2484]: W1213 14:08:02.919170 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.919432 kubelet[2484]: E1213 14:08:02.919416 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.919574 kubelet[2484]: E1213 14:08:02.919563 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.919651 kubelet[2484]: W1213 14:08:02.919639 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.919761 kubelet[2484]: E1213 14:08:02.919737 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.919998 kubelet[2484]: E1213 14:08:02.919984 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.920095 kubelet[2484]: W1213 14:08:02.920083 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.920206 kubelet[2484]: E1213 14:08:02.920176 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.920259 kubelet[2484]: I1213 14:08:02.920236 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/68671505-86de-4265-ad77-6c366467882e-socket-dir\") pod \"csi-node-driver-nrh6t\" (UID: \"68671505-86de-4265-ad77-6c366467882e\") " pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:02.921350 kubelet[2484]: E1213 14:08:02.921318 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.921466 kubelet[2484]: W1213 14:08:02.921450 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.921585 kubelet[2484]: E1213 14:08:02.921561 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.922519 kubelet[2484]: E1213 14:08:02.922486 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.922636 kubelet[2484]: W1213 14:08:02.922621 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.922810 kubelet[2484]: E1213 14:08:02.922797 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.923011 kubelet[2484]: E1213 14:08:02.922961 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.923089 kubelet[2484]: W1213 14:08:02.923076 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.923259 kubelet[2484]: E1213 14:08:02.923236 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.924356 kubelet[2484]: E1213 14:08:02.924328 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.924448 kubelet[2484]: W1213 14:08:02.924433 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.924544 kubelet[2484]: E1213 14:08:02.924520 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.925132 kubelet[2484]: E1213 14:08:02.925104 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.925245 kubelet[2484]: W1213 14:08:02.925231 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.925370 kubelet[2484]: E1213 14:08:02.925348 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.925945 kubelet[2484]: E1213 14:08:02.925919 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.926036 kubelet[2484]: W1213 14:08:02.926023 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.926137 kubelet[2484]: E1213 14:08:02.926114 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.927564 kubelet[2484]: E1213 14:08:02.927478 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.927672 kubelet[2484]: W1213 14:08:02.927658 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.928370 kubelet[2484]: E1213 14:08:02.927879 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.928596 kubelet[2484]: E1213 14:08:02.928582 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.928673 kubelet[2484]: W1213 14:08:02.928660 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.928731 kubelet[2484]: E1213 14:08:02.928719 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit: BPF prog-id=122 op=LOAD Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2871 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313035613335396231393436643033636231366334326430643531 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2871 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313035613335396231393436643033636231366334326430643531 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit: BPF prog-id=123 op=LOAD Dec 13 14:08:02.929000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2871 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313035613335396231393436643033636231366334326430643531 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit: BPF prog-id=124 op=LOAD Dec 13 14:08:02.929000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2871 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313035613335396231393436643033636231366334326430643531 Dec 13 14:08:02.929000 audit: BPF prog-id=124 op=UNLOAD Dec 13 14:08:02.929000 audit: BPF prog-id=123 op=UNLOAD Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { perfmon } for pid=2883 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit[2883]: AVC avc: denied { bpf } for pid=2883 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:02.929000 audit: BPF prog-id=125 op=LOAD Dec 13 14:08:02.929000 audit[2883]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2871 pid=2883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:02.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664313035613335396231393436643033636231366334326430643531 Dec 13 14:08:02.931735 kubelet[2484]: E1213 14:08:02.931717 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:02.931811 kubelet[2484]: W1213 14:08:02.931798 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:02.931869 kubelet[2484]: E1213 14:08:02.931857 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:02.950136 env[1454]: time="2024-12-13T14:08:02.950085222Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-54b8d47f5-pjqvl,Uid:e60b8bb0-ce84-4a55-8dff-ebf380bb63e0,Namespace:calico-system,Attempt:0,} returns sandbox id \"6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea\"" Dec 13 14:08:02.951683 env[1454]: time="2024-12-13T14:08:02.951646683Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 14:08:03.022561 kubelet[2484]: E1213 14:08:03.022535 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.022704 kubelet[2484]: W1213 14:08:03.022689 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.022771 kubelet[2484]: E1213 14:08:03.022756 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.023429 kubelet[2484]: E1213 14:08:03.023414 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.023512 kubelet[2484]: W1213 14:08:03.023500 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.023590 kubelet[2484]: E1213 14:08:03.023579 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.023816 kubelet[2484]: E1213 14:08:03.023804 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.023886 kubelet[2484]: W1213 14:08:03.023874 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.023948 kubelet[2484]: E1213 14:08:03.023937 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.024164 kubelet[2484]: E1213 14:08:03.024153 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.024258 kubelet[2484]: W1213 14:08:03.024246 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.024338 kubelet[2484]: E1213 14:08:03.024327 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.024570 kubelet[2484]: E1213 14:08:03.024541 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.024570 kubelet[2484]: W1213 14:08:03.024563 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.024652 kubelet[2484]: E1213 14:08:03.024583 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.025099 kubelet[2484]: E1213 14:08:03.025077 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.025099 kubelet[2484]: W1213 14:08:03.025098 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.025189 kubelet[2484]: E1213 14:08:03.025113 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.025387 kubelet[2484]: E1213 14:08:03.025370 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.025387 kubelet[2484]: W1213 14:08:03.025384 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.025478 kubelet[2484]: E1213 14:08:03.025458 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.026227 kubelet[2484]: E1213 14:08:03.025608 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.026227 kubelet[2484]: W1213 14:08:03.025623 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.026227 kubelet[2484]: E1213 14:08:03.025717 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.026227 kubelet[2484]: E1213 14:08:03.025826 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.026227 kubelet[2484]: W1213 14:08:03.025833 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.026450 kubelet[2484]: E1213 14:08:03.026433 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.027372 kubelet[2484]: E1213 14:08:03.027357 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.027456 kubelet[2484]: W1213 14:08:03.027442 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.027628 kubelet[2484]: E1213 14:08:03.027614 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.027802 kubelet[2484]: E1213 14:08:03.027743 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.027889 kubelet[2484]: W1213 14:08:03.027877 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.028018 kubelet[2484]: E1213 14:08:03.028006 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.028340 kubelet[2484]: E1213 14:08:03.028317 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.028421 kubelet[2484]: W1213 14:08:03.028408 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.028571 kubelet[2484]: E1213 14:08:03.028559 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.028804 kubelet[2484]: E1213 14:08:03.028791 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.028893 kubelet[2484]: W1213 14:08:03.028873 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.028995 kubelet[2484]: E1213 14:08:03.028983 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.029339 kubelet[2484]: E1213 14:08:03.029325 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.029470 kubelet[2484]: W1213 14:08:03.029456 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.029633 kubelet[2484]: E1213 14:08:03.029621 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.029895 kubelet[2484]: E1213 14:08:03.029883 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.029999 kubelet[2484]: W1213 14:08:03.029986 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.030126 kubelet[2484]: E1213 14:08:03.030115 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.030461 kubelet[2484]: E1213 14:08:03.030446 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.030563 kubelet[2484]: W1213 14:08:03.030549 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.031462 kubelet[2484]: E1213 14:08:03.031436 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.031462 kubelet[2484]: W1213 14:08:03.031453 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.031685 kubelet[2484]: E1213 14:08:03.031667 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.031685 kubelet[2484]: W1213 14:08:03.031677 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.031948 kubelet[2484]: E1213 14:08:03.031925 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.031948 kubelet[2484]: W1213 14:08:03.031939 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.032042 kubelet[2484]: E1213 14:08:03.031952 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.032894 kubelet[2484]: E1213 14:08:03.032423 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.032894 kubelet[2484]: W1213 14:08:03.032438 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.032894 kubelet[2484]: E1213 14:08:03.032449 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.032894 kubelet[2484]: E1213 14:08:03.032475 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.032894 kubelet[2484]: E1213 14:08:03.032786 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.032894 kubelet[2484]: E1213 14:08:03.032799 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.033228 kubelet[2484]: E1213 14:08:03.033119 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.033228 kubelet[2484]: W1213 14:08:03.033130 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.033228 kubelet[2484]: E1213 14:08:03.033149 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.033372 kubelet[2484]: E1213 14:08:03.033350 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.033372 kubelet[2484]: W1213 14:08:03.033367 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.033428 kubelet[2484]: E1213 14:08:03.033381 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.033603 kubelet[2484]: E1213 14:08:03.033583 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.033603 kubelet[2484]: W1213 14:08:03.033598 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.033664 kubelet[2484]: E1213 14:08:03.033608 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.033765 kubelet[2484]: E1213 14:08:03.033746 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.033765 kubelet[2484]: W1213 14:08:03.033761 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.033825 kubelet[2484]: E1213 14:08:03.033773 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.033968 kubelet[2484]: E1213 14:08:03.033948 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.033968 kubelet[2484]: W1213 14:08:03.033962 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.034061 kubelet[2484]: E1213 14:08:03.034041 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.034384 kubelet[2484]: E1213 14:08:03.034360 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.034384 kubelet[2484]: W1213 14:08:03.034381 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.034485 kubelet[2484]: E1213 14:08:03.034393 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.050495 kubelet[2484]: E1213 14:08:03.050462 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.050495 kubelet[2484]: W1213 14:08:03.050486 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.050636 kubelet[2484]: E1213 14:08:03.050505 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.131518 kubelet[2484]: E1213 14:08:03.131416 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.131682 kubelet[2484]: W1213 14:08:03.131663 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.131756 kubelet[2484]: E1213 14:08:03.131743 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.232398 kubelet[2484]: E1213 14:08:03.232374 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.232540 kubelet[2484]: W1213 14:08:03.232526 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.232602 kubelet[2484]: E1213 14:08:03.232590 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.309000 audit[2971]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:03.309000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffffbebfef0 a2=0 a3=1 items=0 ppid=2613 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.309000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:03.316000 audit[2971]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2971 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:03.316000 audit[2971]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffbebfef0 a2=0 a3=1 items=0 ppid=2613 pid=2971 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:03.333288 kubelet[2484]: E1213 14:08:03.333255 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.333288 kubelet[2484]: W1213 14:08:03.333283 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.333440 kubelet[2484]: E1213 14:08:03.333301 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.433898 kubelet[2484]: E1213 14:08:03.433802 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.434039 kubelet[2484]: W1213 14:08:03.434013 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.434125 kubelet[2484]: E1213 14:08:03.434112 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.535279 kubelet[2484]: E1213 14:08:03.535249 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.535424 kubelet[2484]: W1213 14:08:03.535409 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.536637 kubelet[2484]: E1213 14:08:03.535472 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.636709 kubelet[2484]: E1213 14:08:03.636680 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.637063 kubelet[2484]: W1213 14:08:03.637045 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.637145 kubelet[2484]: E1213 14:08:03.637132 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.642416 kubelet[2484]: E1213 14:08:03.642393 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:03.642543 kubelet[2484]: W1213 14:08:03.642530 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:03.642607 kubelet[2484]: E1213 14:08:03.642595 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:03.671490 systemd[1]: run-containerd-runc-k8s.io-6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea-runc.9flk4V.mount: Deactivated successfully. Dec 13 14:08:03.844763 env[1454]: time="2024-12-13T14:08:03.844709472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r9l2v,Uid:62f49bd3-a59e-4ca6-9a87-66773d3f569e,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:03.907054 env[1454]: time="2024-12-13T14:08:03.906974413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:03.907054 env[1454]: time="2024-12-13T14:08:03.907020772Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:03.907329 env[1454]: time="2024-12-13T14:08:03.907035252Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:03.907535 env[1454]: time="2024-12-13T14:08:03.907496646Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b pid=2985 runtime=io.containerd.runc.v2 Dec 13 14:08:03.922061 systemd[1]: Started cri-containerd-1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b.scope. Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.936000 audit: BPF prog-id=126 op=LOAD Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2985 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336535316433353031353165316163653130306535353164633363 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2985 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336535316433353031353165316163653130306535353164633363 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit: BPF prog-id=127 op=LOAD Dec 13 14:08:03.937000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2985 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336535316433353031353165316163653130306535353164633363 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit: BPF prog-id=128 op=LOAD Dec 13 14:08:03.937000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2985 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336535316433353031353165316163653130306535353164633363 Dec 13 14:08:03.937000 audit: BPF prog-id=128 op=UNLOAD Dec 13 14:08:03.937000 audit: BPF prog-id=127 op=UNLOAD Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { perfmon } for pid=2995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit[2995]: AVC avc: denied { bpf } for pid=2995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:03.937000 audit: BPF prog-id=129 op=LOAD Dec 13 14:08:03.937000 audit[2995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2985 pid=2995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:03.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161336535316433353031353165316163653130306535353164633363 Dec 13 14:08:03.951341 env[1454]: time="2024-12-13T14:08:03.951277087Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-r9l2v,Uid:62f49bd3-a59e-4ca6-9a87-66773d3f569e,Namespace:calico-system,Attempt:0,} returns sandbox id \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\"" Dec 13 14:08:04.604894 kubelet[2484]: E1213 14:08:04.604500 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:04.670631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4164532089.mount: Deactivated successfully. Dec 13 14:08:04.886937 env[1454]: time="2024-12-13T14:08:04.886803894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.894297 env[1454]: time="2024-12-13T14:08:04.894254728Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.898973 env[1454]: time="2024-12-13T14:08:04.898934553Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.902667 env[1454]: time="2024-12-13T14:08:04.902606151Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:04.903292 env[1454]: time="2024-12-13T14:08:04.903246423Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:1d1fc316829ae1650b0b1629b54232520f297e7c3b1444eecd290ae088902a28\"" Dec 13 14:08:04.905471 env[1454]: time="2024-12-13T14:08:04.905443278Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 14:08:04.917885 env[1454]: time="2024-12-13T14:08:04.917843294Z" level=info msg="CreateContainer within sandbox \"6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 14:08:04.956725 env[1454]: time="2024-12-13T14:08:04.956668683Z" level=info msg="CreateContainer within sandbox \"6d105a359b1946d03cb16c42d0d5181db70b0f4c3304d50041205d6c9b1c17ea\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"6f0d0658a187e5220787f0f86fa7d40740f8f693c6d086f6e752452b661217d2\"" Dec 13 14:08:04.957265 env[1454]: time="2024-12-13T14:08:04.957241317Z" level=info msg="StartContainer for \"6f0d0658a187e5220787f0f86fa7d40740f8f693c6d086f6e752452b661217d2\"" Dec 13 14:08:04.975955 systemd[1]: Started cri-containerd-6f0d0658a187e5220787f0f86fa7d40740f8f693c6d086f6e752452b661217d2.scope. Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.990000 audit: BPF prog-id=130 op=LOAD Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2871 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666306430363538613138376535323230373837663066383666613764 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2871 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666306430363538613138376535323230373837663066383666613764 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit: BPF prog-id=131 op=LOAD Dec 13 14:08:04.991000 audit[3028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2871 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666306430363538613138376535323230373837663066383666613764 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.991000 audit: BPF prog-id=132 op=LOAD Dec 13 14:08:04.991000 audit[3028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2871 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666306430363538613138376535323230373837663066383666613764 Dec 13 14:08:04.991000 audit: BPF prog-id=132 op=UNLOAD Dec 13 14:08:04.991000 audit: BPF prog-id=131 op=UNLOAD Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { perfmon } for pid=3028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit[3028]: AVC avc: denied { bpf } for pid=3028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:04.992000 audit: BPF prog-id=133 op=LOAD Dec 13 14:08:04.992000 audit[3028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2871 pid=3028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:04.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666306430363538613138376535323230373837663066383666613764 Dec 13 14:08:05.018820 env[1454]: time="2024-12-13T14:08:05.018771487Z" level=info msg="StartContainer for \"6f0d0658a187e5220787f0f86fa7d40740f8f693c6d086f6e752452b661217d2\" returns successfully" Dec 13 14:08:05.686067 kubelet[2484]: E1213 14:08:05.685898 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.686067 kubelet[2484]: W1213 14:08:05.685922 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.686067 kubelet[2484]: E1213 14:08:05.685942 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.686804 kubelet[2484]: E1213 14:08:05.686602 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.686804 kubelet[2484]: W1213 14:08:05.686617 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.686804 kubelet[2484]: E1213 14:08:05.686634 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.687040 kubelet[2484]: E1213 14:08:05.686950 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.687040 kubelet[2484]: W1213 14:08:05.686961 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.687040 kubelet[2484]: E1213 14:08:05.686972 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.687288 kubelet[2484]: E1213 14:08:05.687275 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.687366 kubelet[2484]: W1213 14:08:05.687354 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.687425 kubelet[2484]: E1213 14:08:05.687414 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.687715 kubelet[2484]: E1213 14:08:05.687701 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.687898 kubelet[2484]: W1213 14:08:05.687884 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.687977 kubelet[2484]: E1213 14:08:05.687966 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.688223 kubelet[2484]: E1213 14:08:05.688189 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.688911 kubelet[2484]: W1213 14:08:05.688887 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.689008 kubelet[2484]: E1213 14:08:05.688995 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.691456 kubelet[2484]: E1213 14:08:05.691439 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.691557 kubelet[2484]: W1213 14:08:05.691544 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.691617 kubelet[2484]: E1213 14:08:05.691606 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.691831 kubelet[2484]: E1213 14:08:05.691820 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.691908 kubelet[2484]: W1213 14:08:05.691897 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.691968 kubelet[2484]: E1213 14:08:05.691957 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.692173 kubelet[2484]: E1213 14:08:05.692162 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.692314 kubelet[2484]: W1213 14:08:05.692301 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.692379 kubelet[2484]: E1213 14:08:05.692368 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.692574 kubelet[2484]: E1213 14:08:05.692563 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.692648 kubelet[2484]: W1213 14:08:05.692637 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.692727 kubelet[2484]: E1213 14:08:05.692716 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.694683 kubelet[2484]: E1213 14:08:05.694664 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.694789 kubelet[2484]: W1213 14:08:05.694776 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.694850 kubelet[2484]: E1213 14:08:05.694838 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.695077 kubelet[2484]: E1213 14:08:05.695066 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.695167 kubelet[2484]: W1213 14:08:05.695156 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.695254 kubelet[2484]: E1213 14:08:05.695243 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.695492 kubelet[2484]: E1213 14:08:05.695481 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.695572 kubelet[2484]: W1213 14:08:05.695560 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.695630 kubelet[2484]: E1213 14:08:05.695619 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.695848 kubelet[2484]: E1213 14:08:05.695819 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.695930 kubelet[2484]: W1213 14:08:05.695918 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.695990 kubelet[2484]: E1213 14:08:05.695979 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.696186 kubelet[2484]: E1213 14:08:05.696175 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.696308 kubelet[2484]: W1213 14:08:05.696295 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.696370 kubelet[2484]: E1213 14:08:05.696359 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.748852 kubelet[2484]: E1213 14:08:05.748813 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.748852 kubelet[2484]: W1213 14:08:05.748840 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.748852 kubelet[2484]: E1213 14:08:05.748861 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.749267 kubelet[2484]: E1213 14:08:05.749251 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.749267 kubelet[2484]: W1213 14:08:05.749263 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.749370 kubelet[2484]: E1213 14:08:05.749279 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.749458 kubelet[2484]: E1213 14:08:05.749439 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.749458 kubelet[2484]: W1213 14:08:05.749452 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.749527 kubelet[2484]: E1213 14:08:05.749467 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.749692 kubelet[2484]: E1213 14:08:05.749675 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.749692 kubelet[2484]: W1213 14:08:05.749688 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.749781 kubelet[2484]: E1213 14:08:05.749701 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.749851 kubelet[2484]: E1213 14:08:05.749832 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.749851 kubelet[2484]: W1213 14:08:05.749845 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.749925 kubelet[2484]: E1213 14:08:05.749854 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.750063 kubelet[2484]: E1213 14:08:05.750048 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.750063 kubelet[2484]: W1213 14:08:05.750059 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.750150 kubelet[2484]: E1213 14:08:05.750073 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.750272 kubelet[2484]: E1213 14:08:05.750256 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.750272 kubelet[2484]: W1213 14:08:05.750268 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.750388 kubelet[2484]: E1213 14:08:05.750370 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.750777 kubelet[2484]: E1213 14:08:05.750758 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.750777 kubelet[2484]: W1213 14:08:05.750769 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.750915 kubelet[2484]: E1213 14:08:05.750893 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.750915 kubelet[2484]: W1213 14:08:05.750909 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.750994 kubelet[2484]: E1213 14:08:05.750895 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.751064 kubelet[2484]: E1213 14:08:05.751053 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.751245 kubelet[2484]: E1213 14:08:05.751227 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.751245 kubelet[2484]: W1213 14:08:05.751239 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.751348 kubelet[2484]: E1213 14:08:05.751254 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.751430 kubelet[2484]: E1213 14:08:05.751410 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.751430 kubelet[2484]: W1213 14:08:05.751424 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.751499 kubelet[2484]: E1213 14:08:05.751440 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.751660 kubelet[2484]: E1213 14:08:05.751643 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.751660 kubelet[2484]: W1213 14:08:05.751656 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.751753 kubelet[2484]: E1213 14:08:05.751670 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.751850 kubelet[2484]: E1213 14:08:05.751817 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.751850 kubelet[2484]: W1213 14:08:05.751831 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.751850 kubelet[2484]: E1213 14:08:05.751841 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.752117 kubelet[2484]: E1213 14:08:05.752103 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.752192 kubelet[2484]: W1213 14:08:05.752179 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.752300 kubelet[2484]: E1213 14:08:05.752288 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.754298 kubelet[2484]: E1213 14:08:05.754277 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.754411 kubelet[2484]: W1213 14:08:05.754396 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.754492 kubelet[2484]: E1213 14:08:05.754479 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.754802 kubelet[2484]: E1213 14:08:05.754779 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.754889 kubelet[2484]: W1213 14:08:05.754875 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.754945 kubelet[2484]: E1213 14:08:05.754934 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.756791 kubelet[2484]: E1213 14:08:05.756774 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.756905 kubelet[2484]: W1213 14:08:05.756892 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.756986 kubelet[2484]: E1213 14:08:05.756974 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:05.758871 kubelet[2484]: E1213 14:08:05.758855 2484 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 14:08:05.759394 kubelet[2484]: W1213 14:08:05.758945 2484 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 14:08:05.759394 kubelet[2484]: E1213 14:08:05.758962 2484 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 14:08:06.388644 env[1454]: time="2024-12-13T14:08:06.388580824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.398071 env[1454]: time="2024-12-13T14:08:06.398025479Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.404630 env[1454]: time="2024-12-13T14:08:06.404587526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.409505 env[1454]: time="2024-12-13T14:08:06.409446112Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:06.410174 env[1454]: time="2024-12-13T14:08:06.410134224Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:ece9bca32e64e726de8bbfc9e175a3ca91e0881cd40352bfcd1d107411f4f348\"" Dec 13 14:08:06.412688 env[1454]: time="2024-12-13T14:08:06.412656556Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 14:08:06.437855 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2699671146.mount: Deactivated successfully. Dec 13 14:08:06.453955 env[1454]: time="2024-12-13T14:08:06.453880858Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571\"" Dec 13 14:08:06.454883 env[1454]: time="2024-12-13T14:08:06.454857407Z" level=info msg="StartContainer for \"f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571\"" Dec 13 14:08:06.483699 systemd[1]: Started cri-containerd-f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571.scope. Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2985 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631343162326337396630336339613533323132623735396233356131 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit: BPF prog-id=134 op=LOAD Dec 13 14:08:06.500000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2985 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631343162326337396630336339613533323132623735396233356131 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit: BPF prog-id=135 op=LOAD Dec 13 14:08:06.500000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2985 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631343162326337396630336339613533323132623735396233356131 Dec 13 14:08:06.500000 audit: BPF prog-id=135 op=UNLOAD Dec 13 14:08:06.500000 audit: BPF prog-id=134 op=UNLOAD Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { perfmon } for pid=3096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit[3096]: AVC avc: denied { bpf } for pid=3096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:06.500000 audit: BPF prog-id=136 op=LOAD Dec 13 14:08:06.500000 audit[3096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2985 pid=3096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:06.500000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631343162326337396630336339613533323132623735396233356131 Dec 13 14:08:06.520035 env[1454]: time="2024-12-13T14:08:06.519981523Z" level=info msg="StartContainer for \"f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571\" returns successfully" Dec 13 14:08:06.526986 systemd[1]: cri-containerd-f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571.scope: Deactivated successfully. Dec 13 14:08:06.530000 audit: BPF prog-id=136 op=UNLOAD Dec 13 14:08:06.602762 kubelet[2484]: E1213 14:08:06.602708 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:06.673887 kubelet[2484]: I1213 14:08:06.673783 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:06.695458 kubelet[2484]: I1213 14:08:06.695141 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-54b8d47f5-pjqvl" podStartSLOduration=2.741859657 podStartE2EDuration="4.695124377s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="2024-12-13 14:08:02.951349967 +0000 UTC m=+13.478895540" lastFinishedPulling="2024-12-13 14:08:04.904614687 +0000 UTC m=+15.432160260" observedRunningTime="2024-12-13 14:08:05.691385328 +0000 UTC m=+16.218930901" watchObservedRunningTime="2024-12-13 14:08:06.695124377 +0000 UTC m=+17.222669950" Dec 13 14:08:07.434477 systemd[1]: run-containerd-runc-k8s.io-f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571-runc.ydktyE.mount: Deactivated successfully. Dec 13 14:08:07.434588 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571-rootfs.mount: Deactivated successfully. Dec 13 14:08:07.469178 env[1454]: time="2024-12-13T14:08:07.468956887Z" level=info msg="shim disconnected" id=f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571 Dec 13 14:08:07.469178 env[1454]: time="2024-12-13T14:08:07.469002286Z" level=warning msg="cleaning up after shim disconnected" id=f141b2c79f03c9a53212b759b35a152236698dd3366b1f19cae2a47019b4a571 namespace=k8s.io Dec 13 14:08:07.469178 env[1454]: time="2024-12-13T14:08:07.469011206Z" level=info msg="cleaning up dead shim" Dec 13 14:08:07.476477 env[1454]: time="2024-12-13T14:08:07.476433965Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:08:07Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3138 runtime=io.containerd.runc.v2\n" Dec 13 14:08:07.678072 env[1454]: time="2024-12-13T14:08:07.678019932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 14:08:08.603264 kubelet[2484]: E1213 14:08:08.603068 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:10.602905 kubelet[2484]: E1213 14:08:10.602839 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:11.024567 env[1454]: time="2024-12-13T14:08:11.024460050Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:11.033218 env[1454]: time="2024-12-13T14:08:11.033167563Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:11.039431 env[1454]: time="2024-12-13T14:08:11.039391500Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:11.045279 env[1454]: time="2024-12-13T14:08:11.045243522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:11.046018 env[1454]: time="2024-12-13T14:08:11.045989394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:e5ca62af4ff61b88f55fe4e0d7723151103d3f6a470fd4ebb311a2de27a9597f\"" Dec 13 14:08:11.048733 env[1454]: time="2024-12-13T14:08:11.048691407Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 14:08:11.079223 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount744551960.mount: Deactivated successfully. Dec 13 14:08:11.094845 env[1454]: time="2024-12-13T14:08:11.094776186Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809\"" Dec 13 14:08:11.095512 env[1454]: time="2024-12-13T14:08:11.095485739Z" level=info msg="StartContainer for \"d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809\"" Dec 13 14:08:11.115724 systemd[1]: Started cri-containerd-d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809.scope. Dec 13 14:08:11.119905 systemd[1]: run-containerd-runc-k8s.io-d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809-runc.5Tn4jI.mount: Deactivated successfully. Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166745 kernel: kauditd_printk_skb: 223 callbacks suppressed Dec 13 14:08:11.166875 kernel: audit: type=1400 audit(1734098891.139:1009): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2985 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:11.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323466333634636562663839396634366464396363386332666361 Dec 13 14:08:11.228121 kernel: audit: type=1300 audit(1734098891.139:1009): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2985 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:11.228248 kernel: audit: type=1327 audit(1734098891.139:1009): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323466333634636562663839396634366464396363386332666361 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.247766 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.268464 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.287526 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.307235 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.308108 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.348355 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.369385 kernel: audit: type=1400 audit(1734098891.139:1010): avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.370406 env[1454]: time="2024-12-13T14:08:11.370363908Z" level=info msg="StartContainer for \"d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809\" returns successfully" Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.139000 audit: BPF prog-id=137 op=LOAD Dec 13 14:08:11.139000 audit[3160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2985 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:11.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323466333634636562663839396634366464396363386332666361 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.146000 audit: BPF prog-id=138 op=LOAD Dec 13 14:08:11.146000 audit[3160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2985 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:11.146000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323466333634636562663839396634366464396363386332666361 Dec 13 14:08:11.166000 audit: BPF prog-id=138 op=UNLOAD Dec 13 14:08:11.166000 audit: BPF prog-id=137 op=UNLOAD Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { perfmon } for pid=3160 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit[3160]: AVC avc: denied { bpf } for pid=3160 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:11.166000 audit: BPF prog-id=139 op=LOAD Dec 13 14:08:11.166000 audit[3160]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2985 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:11.166000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438323466333634636562663839396634366464396363386332666361 Dec 13 14:08:12.602263 kubelet[2484]: E1213 14:08:12.602220 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:12.911504 env[1454]: time="2024-12-13T14:08:12.911370549Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 14:08:12.914316 kubelet[2484]: I1213 14:08:12.914282 2484 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 14:08:12.920372 systemd[1]: cri-containerd-d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809.scope: Deactivated successfully. Dec 13 14:08:12.929000 audit: BPF prog-id=139 op=UNLOAD Dec 13 14:08:12.942606 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809-rootfs.mount: Deactivated successfully. Dec 13 14:08:12.961491 systemd[1]: Created slice kubepods-burstable-pod2470d079_9bb7_4446_b26c_e5f6c4b88b84.slice. Dec 13 14:08:12.971164 systemd[1]: Created slice kubepods-besteffort-poda821b48b_846c_4038_887d_f8b3fc33acff.slice. Dec 13 14:08:13.193812 kubelet[2484]: I1213 14:08:13.099414 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbwdf\" (UniqueName: \"kubernetes.io/projected/caf4ff8a-178b-40aa-b71b-81f5370f33a2-kube-api-access-qbwdf\") pod \"calico-apiserver-5665844f64-dvc9f\" (UID: \"caf4ff8a-178b-40aa-b71b-81f5370f33a2\") " pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" Dec 13 14:08:13.193812 kubelet[2484]: I1213 14:08:13.099453 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a821b48b-846c-4038-887d-f8b3fc33acff-tigera-ca-bundle\") pod \"calico-kube-controllers-544bc7fb8-rpkdk\" (UID: \"a821b48b-846c-4038-887d-f8b3fc33acff\") " pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" Dec 13 14:08:13.193812 kubelet[2484]: I1213 14:08:13.099490 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vhp2p\" (UniqueName: \"kubernetes.io/projected/2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7-kube-api-access-vhp2p\") pod \"coredns-6f6b679f8f-lfndj\" (UID: \"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7\") " pod="kube-system/coredns-6f6b679f8f-lfndj" Dec 13 14:08:13.193812 kubelet[2484]: I1213 14:08:13.099510 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-86pkm\" (UniqueName: \"kubernetes.io/projected/2470d079-9bb7-4446-b26c-e5f6c4b88b84-kube-api-access-86pkm\") pod \"coredns-6f6b679f8f-nr68g\" (UID: \"2470d079-9bb7-4446-b26c-e5f6c4b88b84\") " pod="kube-system/coredns-6f6b679f8f-nr68g" Dec 13 14:08:13.193812 kubelet[2484]: I1213 14:08:13.099535 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/caf4ff8a-178b-40aa-b71b-81f5370f33a2-calico-apiserver-certs\") pod \"calico-apiserver-5665844f64-dvc9f\" (UID: \"caf4ff8a-178b-40aa-b71b-81f5370f33a2\") " pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" Dec 13 14:08:12.976412 systemd[1]: Created slice kubepods-burstable-pod2832dbf7_6ec9_4b2d_8da4_1f574bb1ceb7.slice. Dec 13 14:08:13.194042 kubelet[2484]: I1213 14:08:13.099605 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-plkgq\" (UniqueName: \"kubernetes.io/projected/a821b48b-846c-4038-887d-f8b3fc33acff-kube-api-access-plkgq\") pod \"calico-kube-controllers-544bc7fb8-rpkdk\" (UID: \"a821b48b-846c-4038-887d-f8b3fc33acff\") " pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" Dec 13 14:08:13.194042 kubelet[2484]: I1213 14:08:13.099646 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8j46t\" (UniqueName: \"kubernetes.io/projected/0b5999b9-0821-46d4-96d9-c5ff2049c929-kube-api-access-8j46t\") pod \"calico-apiserver-5665844f64-ntzm4\" (UID: \"0b5999b9-0821-46d4-96d9-c5ff2049c929\") " pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" Dec 13 14:08:13.194042 kubelet[2484]: I1213 14:08:13.099666 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7-config-volume\") pod \"coredns-6f6b679f8f-lfndj\" (UID: \"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7\") " pod="kube-system/coredns-6f6b679f8f-lfndj" Dec 13 14:08:13.194042 kubelet[2484]: I1213 14:08:13.099716 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0b5999b9-0821-46d4-96d9-c5ff2049c929-calico-apiserver-certs\") pod \"calico-apiserver-5665844f64-ntzm4\" (UID: \"0b5999b9-0821-46d4-96d9-c5ff2049c929\") " pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" Dec 13 14:08:13.194042 kubelet[2484]: I1213 14:08:13.099734 2484 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2470d079-9bb7-4446-b26c-e5f6c4b88b84-config-volume\") pod \"coredns-6f6b679f8f-nr68g\" (UID: \"2470d079-9bb7-4446-b26c-e5f6c4b88b84\") " pod="kube-system/coredns-6f6b679f8f-nr68g" Dec 13 14:08:12.991508 systemd[1]: Created slice kubepods-besteffort-podcaf4ff8a_178b_40aa_b71b_81f5370f33a2.slice. Dec 13 14:08:12.996500 systemd[1]: Created slice kubepods-besteffort-pod0b5999b9_0821_46d4_96d9_c5ff2049c929.slice. Dec 13 14:08:13.496269 env[1454]: time="2024-12-13T14:08:13.496144071Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nr68g,Uid:2470d079-9bb7-4446-b26c-e5f6c4b88b84,Namespace:kube-system,Attempt:0,}" Dec 13 14:08:13.497254 env[1454]: time="2024-12-13T14:08:13.497213021Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-ntzm4,Uid:0b5999b9-0821-46d4-96d9-c5ff2049c929,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:08:13.497711 env[1454]: time="2024-12-13T14:08:13.497677537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-dvc9f,Uid:caf4ff8a-178b-40aa-b71b-81f5370f33a2,Namespace:calico-apiserver,Attempt:0,}" Dec 13 14:08:13.497921 env[1454]: time="2024-12-13T14:08:13.497886854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544bc7fb8-rpkdk,Uid:a821b48b-846c-4038-887d-f8b3fc33acff,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:13.498228 env[1454]: time="2024-12-13T14:08:13.498182172Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-lfndj,Uid:2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7,Namespace:kube-system,Attempt:0,}" Dec 13 14:08:13.744137 env[1454]: time="2024-12-13T14:08:13.744060768Z" level=info msg="shim disconnected" id=d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809 Dec 13 14:08:13.744137 env[1454]: time="2024-12-13T14:08:13.744131648Z" level=warning msg="cleaning up after shim disconnected" id=d824f364cebf899f46dd9cc8c2fca69e0563580e471f71804eae750822556809 namespace=k8s.io Dec 13 14:08:13.744137 env[1454]: time="2024-12-13T14:08:13.744142088Z" level=info msg="cleaning up dead shim" Dec 13 14:08:13.754436 env[1454]: time="2024-12-13T14:08:13.752975483Z" level=warning msg="cleanup warnings time=\"2024-12-13T14:08:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3211 runtime=io.containerd.runc.v2\n" Dec 13 14:08:14.004426 env[1454]: time="2024-12-13T14:08:14.004345027Z" level=error msg="Failed to destroy network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.006595 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd-shm.mount: Deactivated successfully. Dec 13 14:08:14.008444 env[1454]: time="2024-12-13T14:08:14.008380349Z" level=error msg="encountered an error cleaning up failed sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.008560 env[1454]: time="2024-12-13T14:08:14.008462468Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-dvc9f,Uid:caf4ff8a-178b-40aa-b71b-81f5370f33a2,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.009112 kubelet[2484]: E1213 14:08:14.008742 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.009112 kubelet[2484]: E1213 14:08:14.008807 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" Dec 13 14:08:14.009112 kubelet[2484]: E1213 14:08:14.008828 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" Dec 13 14:08:14.009483 kubelet[2484]: E1213 14:08:14.008873 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5665844f64-dvc9f_calico-apiserver(caf4ff8a-178b-40aa-b71b-81f5370f33a2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5665844f64-dvc9f_calico-apiserver(caf4ff8a-178b-40aa-b71b-81f5370f33a2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" podUID="caf4ff8a-178b-40aa-b71b-81f5370f33a2" Dec 13 14:08:14.033980 env[1454]: time="2024-12-13T14:08:14.033914668Z" level=error msg="Failed to destroy network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.036055 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6-shm.mount: Deactivated successfully. Dec 13 14:08:14.037094 env[1454]: time="2024-12-13T14:08:14.037038719Z" level=error msg="encountered an error cleaning up failed sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.037172 env[1454]: time="2024-12-13T14:08:14.037120158Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nr68g,Uid:2470d079-9bb7-4446-b26c-e5f6c4b88b84,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.038610 kubelet[2484]: E1213 14:08:14.037370 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.038610 kubelet[2484]: E1213 14:08:14.037437 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-nr68g" Dec 13 14:08:14.038610 kubelet[2484]: E1213 14:08:14.037455 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-nr68g" Dec 13 14:08:14.038866 kubelet[2484]: E1213 14:08:14.037510 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-nr68g_kube-system(2470d079-9bb7-4446-b26c-e5f6c4b88b84)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-nr68g_kube-system(2470d079-9bb7-4446-b26c-e5f6c4b88b84)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-nr68g" podUID="2470d079-9bb7-4446-b26c-e5f6c4b88b84" Dec 13 14:08:14.059938 env[1454]: time="2024-12-13T14:08:14.059872024Z" level=error msg="Failed to destroy network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.061975 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87-shm.mount: Deactivated successfully. Dec 13 14:08:14.064751 env[1454]: time="2024-12-13T14:08:14.062925155Z" level=error msg="encountered an error cleaning up failed sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.064751 env[1454]: time="2024-12-13T14:08:14.062998674Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-ntzm4,Uid:0b5999b9-0821-46d4-96d9-c5ff2049c929,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.066615 kubelet[2484]: E1213 14:08:14.064378 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.066615 kubelet[2484]: E1213 14:08:14.064437 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" Dec 13 14:08:14.066615 kubelet[2484]: E1213 14:08:14.064457 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" Dec 13 14:08:14.066721 kubelet[2484]: E1213 14:08:14.064495 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-5665844f64-ntzm4_calico-apiserver(0b5999b9-0821-46d4-96d9-c5ff2049c929)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-5665844f64-ntzm4_calico-apiserver(0b5999b9-0821-46d4-96d9-c5ff2049c929)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" podUID="0b5999b9-0821-46d4-96d9-c5ff2049c929" Dec 13 14:08:14.074154 env[1454]: time="2024-12-13T14:08:14.074085170Z" level=error msg="Failed to destroy network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.076436 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a-shm.mount: Deactivated successfully. Dec 13 14:08:14.078646 env[1454]: time="2024-12-13T14:08:14.078586407Z" level=error msg="encountered an error cleaning up failed sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.078814 env[1454]: time="2024-12-13T14:08:14.078785886Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544bc7fb8-rpkdk,Uid:a821b48b-846c-4038-887d-f8b3fc33acff,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.079224 kubelet[2484]: E1213 14:08:14.079139 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.079652 kubelet[2484]: E1213 14:08:14.079323 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" Dec 13 14:08:14.079652 kubelet[2484]: E1213 14:08:14.079357 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" Dec 13 14:08:14.079652 kubelet[2484]: E1213 14:08:14.079396 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-544bc7fb8-rpkdk_calico-system(a821b48b-846c-4038-887d-f8b3fc33acff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-544bc7fb8-rpkdk_calico-system(a821b48b-846c-4038-887d-f8b3fc33acff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" podUID="a821b48b-846c-4038-887d-f8b3fc33acff" Dec 13 14:08:14.083392 env[1454]: time="2024-12-13T14:08:14.083345763Z" level=error msg="Failed to destroy network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.083907 env[1454]: time="2024-12-13T14:08:14.083871318Z" level=error msg="encountered an error cleaning up failed sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.084044 env[1454]: time="2024-12-13T14:08:14.084015116Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-lfndj,Uid:2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.084530 kubelet[2484]: E1213 14:08:14.084352 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.084530 kubelet[2484]: E1213 14:08:14.084408 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-lfndj" Dec 13 14:08:14.084530 kubelet[2484]: E1213 14:08:14.084429 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-lfndj" Dec 13 14:08:14.084667 kubelet[2484]: E1213 14:08:14.084478 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-lfndj_kube-system(2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-lfndj_kube-system(2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-lfndj" podUID="2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7" Dec 13 14:08:14.607120 systemd[1]: Created slice kubepods-besteffort-pod68671505_86de_4265_ad77_6c366467882e.slice. Dec 13 14:08:14.609972 env[1454]: time="2024-12-13T14:08:14.609934600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nrh6t,Uid:68671505-86de-4265-ad77-6c366467882e,Namespace:calico-system,Attempt:0,}" Dec 13 14:08:14.689963 env[1454]: time="2024-12-13T14:08:14.689894047Z" level=error msg="Failed to destroy network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.691595 env[1454]: time="2024-12-13T14:08:14.691547111Z" level=error msg="encountered an error cleaning up failed sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.691716 env[1454]: time="2024-12-13T14:08:14.691604871Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nrh6t,Uid:68671505-86de-4265-ad77-6c366467882e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.692229 kubelet[2484]: E1213 14:08:14.691830 2484 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.692229 kubelet[2484]: E1213 14:08:14.691890 2484 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:14.692229 kubelet[2484]: E1213 14:08:14.691912 2484 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nrh6t" Dec 13 14:08:14.692435 kubelet[2484]: E1213 14:08:14.691960 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nrh6t_calico-system(68671505-86de-4265-ad77-6c366467882e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nrh6t_calico-system(68671505-86de-4265-ad77-6c366467882e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:14.695597 kubelet[2484]: I1213 14:08:14.695576 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:14.696486 env[1454]: time="2024-12-13T14:08:14.696447385Z" level=info msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" Dec 13 14:08:14.696884 env[1454]: time="2024-12-13T14:08:14.696847741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 14:08:14.707802 kubelet[2484]: I1213 14:08:14.707237 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:14.708099 env[1454]: time="2024-12-13T14:08:14.708070236Z" level=info msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" Dec 13 14:08:14.710725 kubelet[2484]: I1213 14:08:14.710316 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:14.711065 env[1454]: time="2024-12-13T14:08:14.710974448Z" level=info msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" Dec 13 14:08:14.712249 kubelet[2484]: I1213 14:08:14.711869 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:14.714713 env[1454]: time="2024-12-13T14:08:14.714646694Z" level=info msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" Dec 13 14:08:14.716851 kubelet[2484]: I1213 14:08:14.716482 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:14.717520 env[1454]: time="2024-12-13T14:08:14.717476067Z" level=info msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" Dec 13 14:08:14.759377 env[1454]: time="2024-12-13T14:08:14.759281433Z" level=error msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" failed" error="failed to destroy network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.760173 kubelet[2484]: E1213 14:08:14.759824 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:14.760173 kubelet[2484]: E1213 14:08:14.759892 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5"} Dec 13 14:08:14.760173 kubelet[2484]: E1213 14:08:14.759961 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:14.760173 kubelet[2484]: E1213 14:08:14.759982 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-lfndj" podUID="2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7" Dec 13 14:08:14.793513 env[1454]: time="2024-12-13T14:08:14.793449671Z" level=error msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" failed" error="failed to destroy network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.793754 kubelet[2484]: E1213 14:08:14.793690 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:14.793815 kubelet[2484]: E1213 14:08:14.793759 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a"} Dec 13 14:08:14.793815 kubelet[2484]: E1213 14:08:14.793793 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a821b48b-846c-4038-887d-f8b3fc33acff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:14.793891 kubelet[2484]: E1213 14:08:14.793816 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a821b48b-846c-4038-887d-f8b3fc33acff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" podUID="a821b48b-846c-4038-887d-f8b3fc33acff" Dec 13 14:08:14.795629 env[1454]: time="2024-12-13T14:08:14.795581451Z" level=error msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" failed" error="failed to destroy network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.796082 kubelet[2484]: E1213 14:08:14.795942 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:14.796082 kubelet[2484]: E1213 14:08:14.795983 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87"} Dec 13 14:08:14.796082 kubelet[2484]: E1213 14:08:14.796028 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0b5999b9-0821-46d4-96d9-c5ff2049c929\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:14.796082 kubelet[2484]: E1213 14:08:14.796050 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0b5999b9-0821-46d4-96d9-c5ff2049c929\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" podUID="0b5999b9-0821-46d4-96d9-c5ff2049c929" Dec 13 14:08:14.801842 env[1454]: time="2024-12-13T14:08:14.801789633Z" level=error msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" failed" error="failed to destroy network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.802030 kubelet[2484]: E1213 14:08:14.801990 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:14.802096 kubelet[2484]: E1213 14:08:14.802042 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd"} Dec 13 14:08:14.802096 kubelet[2484]: E1213 14:08:14.802076 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"caf4ff8a-178b-40aa-b71b-81f5370f33a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:14.802184 kubelet[2484]: E1213 14:08:14.802099 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"caf4ff8a-178b-40aa-b71b-81f5370f33a2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" podUID="caf4ff8a-178b-40aa-b71b-81f5370f33a2" Dec 13 14:08:14.813238 env[1454]: time="2024-12-13T14:08:14.813154405Z" level=error msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" failed" error="failed to destroy network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:14.816143 kubelet[2484]: E1213 14:08:14.816104 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:14.816620 kubelet[2484]: E1213 14:08:14.816567 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6"} Dec 13 14:08:14.816680 kubelet[2484]: E1213 14:08:14.816635 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2470d079-9bb7-4446-b26c-e5f6c4b88b84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:14.816680 kubelet[2484]: E1213 14:08:14.816658 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2470d079-9bb7-4446-b26c-e5f6c4b88b84\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-nr68g" podUID="2470d079-9bb7-4446-b26c-e5f6c4b88b84" Dec 13 14:08:14.943214 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5-shm.mount: Deactivated successfully. Dec 13 14:08:15.719124 kubelet[2484]: I1213 14:08:15.719086 2484 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:15.720044 env[1454]: time="2024-12-13T14:08:15.720002631Z" level=info msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" Dec 13 14:08:15.743942 env[1454]: time="2024-12-13T14:08:15.743860530Z" level=error msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" failed" error="failed to destroy network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 14:08:15.744208 kubelet[2484]: E1213 14:08:15.744159 2484 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:15.744282 kubelet[2484]: E1213 14:08:15.744226 2484 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae"} Dec 13 14:08:15.744282 kubelet[2484]: E1213 14:08:15.744261 2484 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"68671505-86de-4265-ad77-6c366467882e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 14:08:15.744363 kubelet[2484]: E1213 14:08:15.744297 2484 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"68671505-86de-4265-ad77-6c366467882e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nrh6t" podUID="68671505-86de-4265-ad77-6c366467882e" Dec 13 14:08:20.240007 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3721663635.mount: Deactivated successfully. Dec 13 14:08:20.310058 env[1454]: time="2024-12-13T14:08:20.309997069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:20.316286 env[1454]: time="2024-12-13T14:08:20.316242016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:20.320841 env[1454]: time="2024-12-13T14:08:20.320803818Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:20.325306 env[1454]: time="2024-12-13T14:08:20.325259141Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:20.325965 env[1454]: time="2024-12-13T14:08:20.325933895Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:680b8c280812d12c035ca9f0deedea7c761afe0f1cc65109ea2f96bf63801758\"" Dec 13 14:08:20.340940 env[1454]: time="2024-12-13T14:08:20.340896129Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 14:08:20.376575 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1155371792.mount: Deactivated successfully. Dec 13 14:08:20.396585 env[1454]: time="2024-12-13T14:08:20.396514741Z" level=info msg="CreateContainer within sandbox \"1a3e51d350151e1ace100e551dc3ca2f8484e1b11d22a60c5510e93c4518a47b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29\"" Dec 13 14:08:20.398481 env[1454]: time="2024-12-13T14:08:20.398233207Z" level=info msg="StartContainer for \"b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29\"" Dec 13 14:08:20.419906 systemd[1]: Started cri-containerd-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29.scope. Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.445404 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 14:08:20.445506 kernel: audit: type=1400 audit(1734098900.438:1016): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2985 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.492615 kernel: audit: type=1300 audit(1734098900.438:1016): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2985 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236666536343834383330363164373265346336663831313463623233 Dec 13 14:08:20.519062 kernel: audit: type=1327 audit(1734098900.438:1016): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236666536343834383330363164373265346336663831313463623233 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.540399 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.559551 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.579102 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.599097 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.599244 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.617501 env[1454]: time="2024-12-13T14:08:20.617448964Z" level=info msg="StartContainer for \"b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29\" returns successfully" Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.635530 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.653791 kernel: audit: type=1400 audit(1734098900.438:1017): avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit: BPF prog-id=140 op=LOAD Dec 13 14:08:20.438000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2985 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236666536343834383330363164373265346336663831313463623233 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit: BPF prog-id=141 op=LOAD Dec 13 14:08:20.438000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2985 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236666536343834383330363164373265346336663831313463623233 Dec 13 14:08:20.438000 audit: BPF prog-id=141 op=UNLOAD Dec 13 14:08:20.438000 audit: BPF prog-id=140 op=UNLOAD Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:20.438000 audit: BPF prog-id=142 op=LOAD Dec 13 14:08:20.438000 audit[3540]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2985 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:20.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6236666536343834383330363164373265346336663831313463623233 Dec 13 14:08:20.754969 kubelet[2484]: I1213 14:08:20.753350 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-r9l2v" podStartSLOduration=2.379218484 podStartE2EDuration="18.753331021s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="2024-12-13 14:08:03.952636111 +0000 UTC m=+14.480181684" lastFinishedPulling="2024-12-13 14:08:20.326748648 +0000 UTC m=+30.854294221" observedRunningTime="2024-12-13 14:08:20.750802322 +0000 UTC m=+31.278347895" watchObservedRunningTime="2024-12-13 14:08:20.753331021 +0000 UTC m=+31.280876594" Dec 13 14:08:20.862043 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 14:08:20.862238 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 14:08:21.749015 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.V0Ecec.mount: Deactivated successfully. Dec 13 14:08:22.173000 audit[3682]: AVC avc: denied { write } for pid=3682 comm="tee" name="fd" dev="proc" ino=23536 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.173000 audit[3682]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc21bfa11 a2=241 a3=1b6 items=1 ppid=3656 pid=3682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.173000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 14:08:22.173000 audit: PATH item=0 name="/dev/fd/63" inode=23521 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.182000 audit[3698]: AVC avc: denied { write } for pid=3698 comm="tee" name="fd" dev="proc" ino=23548 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.182000 audit[3698]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd8460a10 a2=241 a3=1b6 items=1 ppid=3662 pid=3698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.182000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 14:08:22.182000 audit: PATH item=0 name="/dev/fd/63" inode=23540 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.182000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.189000 audit[3704]: AVC avc: denied { write } for pid=3704 comm="tee" name="fd" dev="proc" ino=24580 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.189000 audit[3704]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe4f65a01 a2=241 a3=1b6 items=1 ppid=3651 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.189000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 14:08:22.189000 audit: PATH item=0 name="/dev/fd/63" inode=23545 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.189000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.193000 audit[3709]: AVC avc: denied { write } for pid=3709 comm="tee" name="fd" dev="proc" ino=24586 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.193000 audit[3709]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed525a12 a2=241 a3=1b6 items=1 ppid=3659 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.193000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 14:08:22.206000 audit[3716]: AVC avc: denied { write } for pid=3716 comm="tee" name="fd" dev="proc" ino=24262 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.206000 audit[3716]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff561a00 a2=241 a3=1b6 items=1 ppid=3661 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.206000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 14:08:22.206000 audit: PATH item=0 name="/dev/fd/63" inode=24257 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.206000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.193000 audit: PATH item=0 name="/dev/fd/63" inode=24254 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.193000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.218000 audit[3723]: AVC avc: denied { write } for pid=3723 comm="tee" name="fd" dev="proc" ino=24593 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.218000 audit[3723]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff18a9a10 a2=241 a3=1b6 items=1 ppid=3669 pid=3723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.218000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 14:08:22.218000 audit: PATH item=0 name="/dev/fd/63" inode=24266 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.218000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:22.228000 audit[3726]: AVC avc: denied { write } for pid=3726 comm="tee" name="fd" dev="proc" ino=24597 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 14:08:22.228000 audit[3726]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9553a10 a2=241 a3=1b6 items=1 ppid=3655 pid=3726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:22.228000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 14:08:22.228000 audit: PATH item=0 name="/dev/fd/63" inode=24590 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 14:08:22.228000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 14:08:25.604423 env[1454]: time="2024-12-13T14:08:25.604386560Z" level=info msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" Dec 13 14:08:25.604965 env[1454]: time="2024-12-13T14:08:25.604542199Z" level=info msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.660 [INFO][3831] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.660 [INFO][3831] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" iface="eth0" netns="/var/run/netns/cni-9fee134e-3ca5-58d5-6d3c-6c267489b07d" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.660 [INFO][3831] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" iface="eth0" netns="/var/run/netns/cni-9fee134e-3ca5-58d5-6d3c-6c267489b07d" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.660 [INFO][3831] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" iface="eth0" netns="/var/run/netns/cni-9fee134e-3ca5-58d5-6d3c-6c267489b07d" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.660 [INFO][3831] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.661 [INFO][3831] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.684 [INFO][3842] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.684 [INFO][3842] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.684 [INFO][3842] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.696 [WARNING][3842] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.696 [INFO][3842] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.698 [INFO][3842] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:25.705688 env[1454]: 2024-12-13 14:08:25.704 [INFO][3831] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:25.708007 systemd[1]: run-netns-cni\x2d9fee134e\x2d3ca5\x2d58d5\x2d6d3c\x2d6c267489b07d.mount: Deactivated successfully. Dec 13 14:08:25.709154 env[1454]: time="2024-12-13T14:08:25.708809516Z" level=info msg="TearDown network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" successfully" Dec 13 14:08:25.709154 env[1454]: time="2024-12-13T14:08:25.708857636Z" level=info msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" returns successfully" Dec 13 14:08:25.709911 env[1454]: time="2024-12-13T14:08:25.709882188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-ntzm4,Uid:0b5999b9-0821-46d4-96d9-c5ff2049c929,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.691 [INFO][3830] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.692 [INFO][3830] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" iface="eth0" netns="/var/run/netns/cni-3a7e2fc6-6653-71f4-15d8-50d89671d42e" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.692 [INFO][3830] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" iface="eth0" netns="/var/run/netns/cni-3a7e2fc6-6653-71f4-15d8-50d89671d42e" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.692 [INFO][3830] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" iface="eth0" netns="/var/run/netns/cni-3a7e2fc6-6653-71f4-15d8-50d89671d42e" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.692 [INFO][3830] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.692 [INFO][3830] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.726 [INFO][3848] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.727 [INFO][3848] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.727 [INFO][3848] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.736 [WARNING][3848] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.736 [INFO][3848] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.738 [INFO][3848] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:25.740910 env[1454]: 2024-12-13 14:08:25.739 [INFO][3830] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:25.743243 systemd[1]: run-netns-cni\x2d3a7e2fc6\x2d6653\x2d71f4\x2d15d8\x2d50d89671d42e.mount: Deactivated successfully. Dec 13 14:08:25.744288 env[1454]: time="2024-12-13T14:08:25.744120964Z" level=info msg="TearDown network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" successfully" Dec 13 14:08:25.744288 env[1454]: time="2024-12-13T14:08:25.744172444Z" level=info msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" returns successfully" Dec 13 14:08:25.744978 env[1454]: time="2024-12-13T14:08:25.744940198Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-lfndj,Uid:2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7,Namespace:kube-system,Attempt:1,}" Dec 13 14:08:25.925808 systemd-networkd[1609]: caliac39513eccf: Link UP Dec 13 14:08:25.939222 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:25.939368 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliac39513eccf: link becomes ready Dec 13 14:08:25.939655 systemd-networkd[1609]: caliac39513eccf: Gained carrier Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.786 [INFO][3856] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.804 [INFO][3856] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0 calico-apiserver-5665844f64- calico-apiserver 0b5999b9-0821-46d4-96d9-c5ff2049c929 762 0 2024-12-13 14:08:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5665844f64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec calico-apiserver-5665844f64-ntzm4 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliac39513eccf [] []}} ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.804 [INFO][3856] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.850 [INFO][3877] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" HandleID="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.861 [INFO][3877] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" HandleID="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a0700), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-02735da4ec", "pod":"calico-apiserver-5665844f64-ntzm4", "timestamp":"2024-12-13 14:08:25.850875422 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.861 [INFO][3877] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.861 [INFO][3877] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.861 [INFO][3877] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.863 [INFO][3877] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.866 [INFO][3877] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.872 [INFO][3877] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.874 [INFO][3877] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.877 [INFO][3877] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.877 [INFO][3877] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.878 [INFO][3877] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995 Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.886 [INFO][3877] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.901 [INFO][3877] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.129/26] block=192.168.82.128/26 handle="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.901 [INFO][3877] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.129/26] handle="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.902 [INFO][3877] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:25.958566 env[1454]: 2024-12-13 14:08:25.902 [INFO][3877] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.129/26] IPv6=[] ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" HandleID="k8s-pod-network.e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.903 [INFO][3856] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b5999b9-0821-46d4-96d9-c5ff2049c929", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"calico-apiserver-5665844f64-ntzm4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac39513eccf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.903 [INFO][3856] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.129/32] ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.903 [INFO][3856] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliac39513eccf ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.930 [INFO][3856] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.942 [INFO][3856] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b5999b9-0821-46d4-96d9-c5ff2049c929", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995", Pod:"calico-apiserver-5665844f64-ntzm4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac39513eccf", MAC:"f2:5c:8c:42:3c:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:25.960723 env[1454]: 2024-12-13 14:08:25.955 [INFO][3856] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-ntzm4" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:25.977880 env[1454]: time="2024-12-13T14:08:25.977793645Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:25.977880 env[1454]: time="2024-12-13T14:08:25.977839045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:25.978091 env[1454]: time="2024-12-13T14:08:25.977850205Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:25.978142 env[1454]: time="2024-12-13T14:08:25.978109643Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995 pid=3914 runtime=io.containerd.runc.v2 Dec 13 14:08:25.990694 systemd[1]: Started cri-containerd-e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995.scope. Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.012187 kernel: kauditd_printk_skb: 68 callbacks suppressed Dec 13 14:08:26.012289 kernel: audit: type=1400 audit(1734098906.005:1029): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.048276 kernel: audit: type=1400 audit(1734098906.005:1030): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.072685 kernel: audit: type=1400 audit(1734098906.005:1031): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.109708 kernel: audit: type=1400 audit(1734098906.005:1032): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.109807 kernel: audit: type=1400 audit(1734098906.005:1033): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.128358 kernel: audit: type=1400 audit(1734098906.005:1034): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.149128 kernel: audit: type=1400 audit(1734098906.005:1035): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.187075 kernel: audit: type=1400 audit(1734098906.005:1036): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.187231 kernel: audit: type=1400 audit(1734098906.005:1037): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.188377 env[1454]: time="2024-12-13T14:08:26.188281649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-ntzm4,Uid:0b5999b9-0821-46d4-96d9-c5ff2049c929,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995\"" Dec 13 14:08:26.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.207993 kernel: audit: type=1400 audit(1734098906.005:1038): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.005000 audit: BPF prog-id=143 op=LOAD Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3914 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363034346235353131653937333833363765363764633563633337 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3914 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363034346235353131653937333833363765363764633563633337 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.017000 audit: BPF prog-id=144 op=LOAD Dec 13 14:08:26.017000 audit[3922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3914 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363034346235353131653937333833363765363764633563633337 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.028000 audit: BPF prog-id=145 op=LOAD Dec 13 14:08:26.028000 audit[3922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3914 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363034346235353131653937333833363765363764633563633337 Dec 13 14:08:26.029000 audit: BPF prog-id=145 op=UNLOAD Dec 13 14:08:26.029000 audit: BPF prog-id=144 op=UNLOAD Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { perfmon } for pid=3922 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit[3922]: AVC avc: denied { bpf } for pid=3922 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.029000 audit: BPF prog-id=146 op=LOAD Dec 13 14:08:26.029000 audit[3922]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3914 pid=3922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539363034346235353131653937333833363765363764633563633337 Dec 13 14:08:26.212326 env[1454]: time="2024-12-13T14:08:26.208294577Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 14:08:26.230361 systemd-networkd[1609]: cali5a67dd7016b: Link UP Dec 13 14:08:26.238314 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5a67dd7016b: link becomes ready Dec 13 14:08:26.239121 systemd-networkd[1609]: cali5a67dd7016b: Gained carrier Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:25.828 [INFO][3868] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:25.842 [INFO][3868] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0 coredns-6f6b679f8f- kube-system 2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7 763 0 2024-12-13 14:07:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec coredns-6f6b679f8f-lfndj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5a67dd7016b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:25.842 [INFO][3868] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:25.884 [INFO][3885] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" HandleID="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.092 [INFO][3885] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" HandleID="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002a14c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-02735da4ec", "pod":"coredns-6f6b679f8f-lfndj", "timestamp":"2024-12-13 14:08:25.884030807 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.092 [INFO][3885] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.092 [INFO][3885] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.092 [INFO][3885] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.113 [INFO][3885] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.131 [INFO][3885] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.192 [INFO][3885] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.209 [INFO][3885] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.212 [INFO][3885] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.212 [INFO][3885] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.214 [INFO][3885] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.218 [INFO][3885] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.226 [INFO][3885] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.130/26] block=192.168.82.128/26 handle="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.227 [INFO][3885] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.130/26] handle="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.227 [INFO][3885] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:26.253740 env[1454]: 2024-12-13 14:08:26.227 [INFO][3885] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.130/26] IPv6=[] ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" HandleID="k8s-pod-network.0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.228 [INFO][3868] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"coredns-6f6b679f8f-lfndj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a67dd7016b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.228 [INFO][3868] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.130/32] ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.228 [INFO][3868] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5a67dd7016b ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.230 [INFO][3868] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.230 [INFO][3868] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7", ResourceVersion:"763", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a", Pod:"coredns-6f6b679f8f-lfndj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a67dd7016b", MAC:"3e:7c:1a:04:42:85", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:26.254409 env[1454]: 2024-12-13 14:08:26.250 [INFO][3868] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a" Namespace="kube-system" Pod="coredns-6f6b679f8f-lfndj" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:26.273317 env[1454]: time="2024-12-13T14:08:26.273230606Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:26.273317 env[1454]: time="2024-12-13T14:08:26.273315245Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:26.273529 env[1454]: time="2024-12-13T14:08:26.273341805Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:26.273663 env[1454]: time="2024-12-13T14:08:26.273623323Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a pid=3968 runtime=io.containerd.runc.v2 Dec 13 14:08:26.284546 systemd[1]: Started cri-containerd-0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a.scope. Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.299000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.300000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.300000 audit: BPF prog-id=147 op=LOAD Dec 13 14:08:26.300000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.300000 audit[3977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336631383738326237353835623039303733373139663035363639 Dec 13 14:08:26.300000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.300000 audit[3977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336631383738326237353835623039303733373139663035363639 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit: BPF prog-id=148 op=LOAD Dec 13 14:08:26.301000 audit[3977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336631383738326237353835623039303733373139663035363639 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.301000 audit: BPF prog-id=149 op=LOAD Dec 13 14:08:26.301000 audit[3977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.301000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336631383738326237353835623039303733373139663035363639 Dec 13 14:08:26.302000 audit: BPF prog-id=149 op=UNLOAD Dec 13 14:08:26.302000 audit: BPF prog-id=148 op=UNLOAD Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { perfmon } for pid=3977 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit[3977]: AVC avc: denied { bpf } for pid=3977 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.302000 audit: BPF prog-id=150 op=LOAD Dec 13 14:08:26.302000 audit[3977]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3968 pid=3977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064336631383738326237353835623039303733373139663035363639 Dec 13 14:08:26.323139 env[1454]: time="2024-12-13T14:08:26.323086708Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-lfndj,Uid:2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7,Namespace:kube-system,Attempt:1,} returns sandbox id \"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a\"" Dec 13 14:08:26.327583 env[1454]: time="2024-12-13T14:08:26.327539154Z" level=info msg="CreateContainer within sandbox \"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:08:26.363994 env[1454]: time="2024-12-13T14:08:26.363931079Z" level=info msg="CreateContainer within sandbox \"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c2639fe714270787e6a6175e4e3f3fa7c65ac80f9ceda3c66a302b986da593dc\"" Dec 13 14:08:26.364793 env[1454]: time="2024-12-13T14:08:26.364764953Z" level=info msg="StartContainer for \"c2639fe714270787e6a6175e4e3f3fa7c65ac80f9ceda3c66a302b986da593dc\"" Dec 13 14:08:26.383367 systemd[1]: Started cri-containerd-c2639fe714270787e6a6175e4e3f3fa7c65ac80f9ceda3c66a302b986da593dc.scope. Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit: BPF prog-id=151 op=LOAD Dec 13 14:08:26.398000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3968 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363339666537313432373037383765366136313735653465336633 Dec 13 14:08:26.398000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.398000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3968 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.398000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363339666537313432373037383765366136313735653465336633 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit: BPF prog-id=152 op=LOAD Dec 13 14:08:26.399000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3968 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363339666537313432373037383765366136313735653465336633 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit: BPF prog-id=153 op=LOAD Dec 13 14:08:26.399000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3968 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363339666537313432373037383765366136313735653465336633 Dec 13 14:08:26.399000 audit: BPF prog-id=153 op=UNLOAD Dec 13 14:08:26.399000 audit: BPF prog-id=152 op=UNLOAD Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:26.399000 audit: BPF prog-id=154 op=LOAD Dec 13 14:08:26.399000 audit[4011]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3968 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332363339666537313432373037383765366136313735653465336633 Dec 13 14:08:26.421080 env[1454]: time="2024-12-13T14:08:26.421023287Z" level=info msg="StartContainer for \"c2639fe714270787e6a6175e4e3f3fa7c65ac80f9ceda3c66a302b986da593dc\" returns successfully" Dec 13 14:08:26.603908 env[1454]: time="2024-12-13T14:08:26.603859223Z" level=info msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" Dec 13 14:08:26.604305 env[1454]: time="2024-12-13T14:08:26.604273019Z" level=info msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" Dec 13 14:08:26.604704 env[1454]: time="2024-12-13T14:08:26.604668176Z" level=info msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.680 [INFO][4105] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.680 [INFO][4105] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" iface="eth0" netns="/var/run/netns/cni-d31c7a55-4785-eb3f-7665-56daa87fc9da" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.680 [INFO][4105] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" iface="eth0" netns="/var/run/netns/cni-d31c7a55-4785-eb3f-7665-56daa87fc9da" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.681 [INFO][4105] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" iface="eth0" netns="/var/run/netns/cni-d31c7a55-4785-eb3f-7665-56daa87fc9da" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.681 [INFO][4105] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.681 [INFO][4105] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.716 [INFO][4122] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.716 [INFO][4122] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.716 [INFO][4122] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.745 [WARNING][4122] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.746 [INFO][4122] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.747 [INFO][4122] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:26.752189 env[1454]: 2024-12-13 14:08:26.751 [INFO][4105] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:26.754498 systemd[1]: run-netns-cni\x2dd31c7a55\x2d4785\x2deb3f\x2d7665\x2d56daa87fc9da.mount: Deactivated successfully. Dec 13 14:08:26.757081 env[1454]: time="2024-12-13T14:08:26.755163877Z" level=info msg="TearDown network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" successfully" Dec 13 14:08:26.757081 env[1454]: time="2024-12-13T14:08:26.755217757Z" level=info msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" returns successfully" Dec 13 14:08:26.757466 env[1454]: time="2024-12-13T14:08:26.757432420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544bc7fb8-rpkdk,Uid:a821b48b-846c-4038-887d-f8b3fc33acff,Namespace:calico-system,Attempt:1,}" Dec 13 14:08:26.761959 kubelet[2484]: I1213 14:08:26.760799 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-lfndj" podStartSLOduration=31.760783435 podStartE2EDuration="31.760783435s" podCreationTimestamp="2024-12-13 14:07:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:26.759085127 +0000 UTC m=+37.286630700" watchObservedRunningTime="2024-12-13 14:08:26.760783435 +0000 UTC m=+37.288329008" Dec 13 14:08:26.776000 audit[4137]: NETFILTER_CFG table=filter:99 family=2 entries=18 op=nft_register_rule pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.776000 audit[4137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6736 a0=3 a1=fffff2b34ac0 a2=0 a3=1 items=0 ppid=2613 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.776000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.783000 audit[4137]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=4137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.783000 audit[4137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff2b34ac0 a2=0 a3=1 items=0 ppid=2613 pid=4137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.831000 audit[4153]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.831000 audit[4153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffe36c7ce0 a2=0 a3=1 items=0 ppid=2613 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.831000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.694 [INFO][4104] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.695 [INFO][4104] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" iface="eth0" netns="/var/run/netns/cni-9dd96443-0690-870a-b2a4-b5b8a5474dc6" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.697 [INFO][4104] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" iface="eth0" netns="/var/run/netns/cni-9dd96443-0690-870a-b2a4-b5b8a5474dc6" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.698 [INFO][4104] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" iface="eth0" netns="/var/run/netns/cni-9dd96443-0690-870a-b2a4-b5b8a5474dc6" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.698 [INFO][4104] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.698 [INFO][4104] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.814 [INFO][4127] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.815 [INFO][4127] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.815 [INFO][4127] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.828 [WARNING][4127] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.828 [INFO][4127] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.830 [INFO][4127] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:26.835032 env[1454]: 2024-12-13 14:08:26.833 [INFO][4104] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:26.837973 env[1454]: time="2024-12-13T14:08:26.837922491Z" level=info msg="TearDown network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" successfully" Dec 13 14:08:26.838087 env[1454]: time="2024-12-13T14:08:26.838068809Z" level=info msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" returns successfully" Dec 13 14:08:26.837000 audit[4153]: NETFILTER_CFG table=nat:102 family=2 entries=33 op=nft_register_chain pid=4153 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:26.837000 audit[4153]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffe36c7ce0 a2=0 a3=1 items=0 ppid=2613 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:26.837000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:26.839905 systemd[1]: run-netns-cni\x2d9dd96443\x2d0690\x2d870a\x2db2a4\x2db5b8a5474dc6.mount: Deactivated successfully. Dec 13 14:08:26.841542 env[1454]: time="2024-12-13T14:08:26.841356745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nrh6t,Uid:68671505-86de-4265-ad77-6c366467882e,Namespace:calico-system,Attempt:1,}" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.730 [INFO][4106] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.730 [INFO][4106] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" iface="eth0" netns="/var/run/netns/cni-400d2e23-f291-aa0a-2163-86279dcb86bc" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.731 [INFO][4106] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" iface="eth0" netns="/var/run/netns/cni-400d2e23-f291-aa0a-2163-86279dcb86bc" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.731 [INFO][4106] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" iface="eth0" netns="/var/run/netns/cni-400d2e23-f291-aa0a-2163-86279dcb86bc" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.731 [INFO][4106] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.731 [INFO][4106] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.828 [INFO][4132] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.832 [INFO][4132] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.832 [INFO][4132] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.862 [WARNING][4132] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.862 [INFO][4132] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.864 [INFO][4132] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:26.870224 env[1454]: 2024-12-13 14:08:26.867 [INFO][4106] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:26.870224 env[1454]: time="2024-12-13T14:08:26.868618658Z" level=info msg="TearDown network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" successfully" Dec 13 14:08:26.870224 env[1454]: time="2024-12-13T14:08:26.868871176Z" level=info msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" returns successfully" Dec 13 14:08:26.871449 env[1454]: time="2024-12-13T14:08:26.871388597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nr68g,Uid:2470d079-9bb7-4446-b26c-e5f6c4b88b84,Namespace:kube-system,Attempt:1,}" Dec 13 14:08:26.969566 systemd-networkd[1609]: calid8e59a9816b: Link UP Dec 13 14:08:26.986993 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:26.987119 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid8e59a9816b: link becomes ready Dec 13 14:08:26.988294 systemd-networkd[1609]: calid8e59a9816b: Gained carrier Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.875 [INFO][4140] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.892 [INFO][4140] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0 calico-kube-controllers-544bc7fb8- calico-system a821b48b-846c-4038-887d-f8b3fc33acff 778 0 2024-12-13 14:08:02 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:544bc7fb8 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec calico-kube-controllers-544bc7fb8-rpkdk eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid8e59a9816b [] []}} ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.893 [INFO][4140] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.919 [INFO][4158] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" HandleID="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.932 [INFO][4158] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" HandleID="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000316e70), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-02735da4ec", "pod":"calico-kube-controllers-544bc7fb8-rpkdk", "timestamp":"2024-12-13 14:08:26.919342074 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.932 [INFO][4158] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.932 [INFO][4158] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.932 [INFO][4158] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.934 [INFO][4158] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.938 [INFO][4158] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.942 [INFO][4158] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.944 [INFO][4158] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.946 [INFO][4158] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.946 [INFO][4158] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.948 [INFO][4158] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9 Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.953 [INFO][4158] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.964 [INFO][4158] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.131/26] block=192.168.82.128/26 handle="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.964 [INFO][4158] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.131/26] handle="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.964 [INFO][4158] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:27.014128 env[1454]: 2024-12-13 14:08:26.964 [INFO][4158] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.131/26] IPv6=[] ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" HandleID="k8s-pod-network.8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:26.966 [INFO][4140] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0", GenerateName:"calico-kube-controllers-544bc7fb8-", Namespace:"calico-system", SelfLink:"", UID:"a821b48b-846c-4038-887d-f8b3fc33acff", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544bc7fb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"calico-kube-controllers-544bc7fb8-rpkdk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8e59a9816b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:26.966 [INFO][4140] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.131/32] ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:26.966 [INFO][4140] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid8e59a9816b ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:26.990 [INFO][4140] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:26.990 [INFO][4140] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0", GenerateName:"calico-kube-controllers-544bc7fb8-", Namespace:"calico-system", SelfLink:"", UID:"a821b48b-846c-4038-887d-f8b3fc33acff", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544bc7fb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9", Pod:"calico-kube-controllers-544bc7fb8-rpkdk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8e59a9816b", MAC:"86:fc:13:5d:d2:04", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.014817 env[1454]: 2024-12-13 14:08:27.006 [INFO][4140] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9" Namespace="calico-system" Pod="calico-kube-controllers-544bc7fb8-rpkdk" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:27.102583 env[1454]: time="2024-12-13T14:08:27.100800993Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:27.102583 env[1454]: time="2024-12-13T14:08:27.100975112Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:27.102583 env[1454]: time="2024-12-13T14:08:27.100988871Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:27.107866 env[1454]: time="2024-12-13T14:08:27.103516013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9 pid=4219 runtime=io.containerd.runc.v2 Dec 13 14:08:27.120856 systemd[1]: Started cri-containerd-8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9.scope. Dec 13 14:08:27.137795 systemd-networkd[1609]: calib1754765d31: Link UP Dec 13 14:08:27.145715 systemd-networkd[1609]: calib1754765d31: Gained carrier Dec 13 14:08:27.146229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib1754765d31: link becomes ready Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.151000 audit: BPF prog-id=155 op=LOAD Dec 13 14:08:27.158000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.158000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4219 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864333966643465323064663830303663383438323936643130363632 Dec 13 14:08:27.158000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.158000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4219 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864333966643465323064663830303663383438323936643130363632 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit: BPF prog-id=156 op=LOAD Dec 13 14:08:27.159000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4219 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864333966643465323064663830303663383438323936643130363632 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.159000 audit: BPF prog-id=157 op=LOAD Dec 13 14:08:27.159000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4219 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864333966643465323064663830303663383438323936643130363632 Dec 13 14:08:27.160000 audit: BPF prog-id=157 op=UNLOAD Dec 13 14:08:27.160000 audit: BPF prog-id=156 op=UNLOAD Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { perfmon } for pid=4230 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit[4230]: AVC avc: denied { bpf } for pid=4230 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.160000 audit: BPF prog-id=158 op=LOAD Dec 13 14:08:27.160000 audit[4230]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4219 pid=4230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.160000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864333966643465323064663830303663383438323936643130363632 Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:26.998 [INFO][4164] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.020 [INFO][4164] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0 csi-node-driver- calico-system 68671505-86de-4265-ad77-6c366467882e 779 0 2024-12-13 14:08:02 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec csi-node-driver-nrh6t eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib1754765d31 [] []}} ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.020 [INFO][4164] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.074 [INFO][4197] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" HandleID="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.087 [INFO][4197] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" HandleID="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000310e10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-02735da4ec", "pod":"csi-node-driver-nrh6t", "timestamp":"2024-12-13 14:08:27.074579628 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.087 [INFO][4197] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.087 [INFO][4197] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.087 [INFO][4197] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.090 [INFO][4197] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.094 [INFO][4197] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.098 [INFO][4197] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.100 [INFO][4197] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.103 [INFO][4197] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.107 [INFO][4197] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.109 [INFO][4197] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.115 [INFO][4197] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.127 [INFO][4197] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.132/26] block=192.168.82.128/26 handle="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.128 [INFO][4197] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.132/26] handle="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.128 [INFO][4197] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:27.171492 env[1454]: 2024-12-13 14:08:27.128 [INFO][4197] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.132/26] IPv6=[] ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" HandleID="k8s-pod-network.2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.130 [INFO][4164] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68671505-86de-4265-ad77-6c366467882e", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"csi-node-driver-nrh6t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib1754765d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.130 [INFO][4164] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.132/32] ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.130 [INFO][4164] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib1754765d31 ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.147 [INFO][4164] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.150 [INFO][4164] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68671505-86de-4265-ad77-6c366467882e", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f", Pod:"csi-node-driver-nrh6t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib1754765d31", MAC:"ca:22:f3:f2:8f:84", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.172186 env[1454]: 2024-12-13 14:08:27.167 [INFO][4164] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f" Namespace="calico-system" Pod="csi-node-driver-nrh6t" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:27.195804 env[1454]: time="2024-12-13T14:08:27.195664967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-544bc7fb8-rpkdk,Uid:a821b48b-846c-4038-887d-f8b3fc33acff,Namespace:calico-system,Attempt:1,} returns sandbox id \"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9\"" Dec 13 14:08:27.213959 env[1454]: time="2024-12-13T14:08:27.213879391Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:27.214177 env[1454]: time="2024-12-13T14:08:27.214152829Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:27.214294 env[1454]: time="2024-12-13T14:08:27.214272148Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:27.214518 env[1454]: time="2024-12-13T14:08:27.214491786Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f pid=4271 runtime=io.containerd.runc.v2 Dec 13 14:08:27.226630 systemd[1]: Started cri-containerd-2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f.scope. Dec 13 14:08:27.250042 systemd-networkd[1609]: calica26861d169: Link UP Dec 13 14:08:27.262333 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calica26861d169: link becomes ready Dec 13 14:08:27.262003 systemd-networkd[1609]: calica26861d169: Gained carrier Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.270000 audit: BPF prog-id=159 op=LOAD Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4271 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333132383366653665353533376664323333653665623539616338 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4271 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333132383366653665353533376664323333653665623539616338 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit: BPF prog-id=160 op=LOAD Dec 13 14:08:27.271000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4271 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333132383366653665353533376664323333653665623539616338 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit: BPF prog-id=161 op=LOAD Dec 13 14:08:27.271000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4271 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333132383366653665353533376664323333653665623539616338 Dec 13 14:08:27.271000 audit: BPF prog-id=161 op=UNLOAD Dec 13 14:08:27.271000 audit: BPF prog-id=160 op=UNLOAD Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { perfmon } for pid=4279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit[4279]: AVC avc: denied { bpf } for pid=4279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.271000 audit: BPF prog-id=162 op=LOAD Dec 13 14:08:27.271000 audit[4279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4271 pid=4279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.271000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333132383366653665353533376664323333653665623539616338 Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.033 [INFO][4175] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.055 [INFO][4175] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0 coredns-6f6b679f8f- kube-system 2470d079-9bb7-4446-b26c-e5f6c4b88b84 780 0 2024-12-13 14:07:55 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec coredns-6f6b679f8f-nr68g eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calica26861d169 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.055 [INFO][4175] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.101 [INFO][4205] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" HandleID="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.187 [INFO][4205] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" HandleID="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000310af0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-02735da4ec", "pod":"coredns-6f6b679f8f-nr68g", "timestamp":"2024-12-13 14:08:27.101839265 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.187 [INFO][4205] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.187 [INFO][4205] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.187 [INFO][4205] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.190 [INFO][4205] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.194 [INFO][4205] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.199 [INFO][4205] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.203 [INFO][4205] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.209 [INFO][4205] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.209 [INFO][4205] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.211 [INFO][4205] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90 Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.217 [INFO][4205] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.231 [INFO][4205] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.133/26] block=192.168.82.128/26 handle="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.232 [INFO][4205] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.133/26] handle="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.232 [INFO][4205] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:27.284017 env[1454]: 2024-12-13 14:08:27.232 [INFO][4205] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.133/26] IPv6=[] ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" HandleID="k8s-pod-network.5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.236 [INFO][4175] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2470d079-9bb7-4446-b26c-e5f6c4b88b84", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"coredns-6f6b679f8f-nr68g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calica26861d169", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.236 [INFO][4175] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.133/32] ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.236 [INFO][4175] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calica26861d169 ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.263 [INFO][4175] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.263 [INFO][4175] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2470d079-9bb7-4446-b26c-e5f6c4b88b84", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90", Pod:"coredns-6f6b679f8f-nr68g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calica26861d169", MAC:"4e:4f:02:fc:8a:24", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:27.284702 env[1454]: 2024-12-13 14:08:27.281 [INFO][4175] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90" Namespace="kube-system" Pod="coredns-6f6b679f8f-nr68g" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:27.294295 env[1454]: time="2024-12-13T14:08:27.294252673Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nrh6t,Uid:68671505-86de-4265-ad77-6c366467882e,Namespace:calico-system,Attempt:1,} returns sandbox id \"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f\"" Dec 13 14:08:27.313183 env[1454]: time="2024-12-13T14:08:27.313100692Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:27.313183 env[1454]: time="2024-12-13T14:08:27.313149172Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:27.313454 env[1454]: time="2024-12-13T14:08:27.313160852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:27.313539 env[1454]: time="2024-12-13T14:08:27.313432290Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90 pid=4322 runtime=io.containerd.runc.v2 Dec 13 14:08:27.327404 systemd[1]: Started cri-containerd-5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90.scope. Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.341000 audit: BPF prog-id=163 op=LOAD Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=4322 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533393166373264383438356237663161346235653436636433633962 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=4322 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533393166373264383438356237663161346235653436636433633962 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.342000 audit: BPF prog-id=164 op=LOAD Dec 13 14:08:27.342000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=4322 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.342000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533393166373264383438356237663161346235653436636433633962 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit: BPF prog-id=165 op=LOAD Dec 13 14:08:27.343000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=4322 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533393166373264383438356237663161346235653436636433633962 Dec 13 14:08:27.343000 audit: BPF prog-id=165 op=UNLOAD Dec 13 14:08:27.343000 audit: BPF prog-id=164 op=UNLOAD Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.343000 audit: BPF prog-id=166 op=LOAD Dec 13 14:08:27.343000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=4322 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533393166373264383438356237663161346235653436636433633962 Dec 13 14:08:27.369624 env[1454]: time="2024-12-13T14:08:27.369583192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-nr68g,Uid:2470d079-9bb7-4446-b26c-e5f6c4b88b84,Namespace:kube-system,Attempt:1,} returns sandbox id \"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90\"" Dec 13 14:08:27.374690 env[1454]: time="2024-12-13T14:08:27.374629554Z" level=info msg="CreateContainer within sandbox \"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 14:08:27.428494 env[1454]: time="2024-12-13T14:08:27.420487853Z" level=info msg="CreateContainer within sandbox \"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"85e65f7281abfb63129e2d4aac419aa8cd1ea8781b4e9c053af23bd08c29abf3\"" Dec 13 14:08:27.428494 env[1454]: time="2024-12-13T14:08:27.421195007Z" level=info msg="StartContainer for \"85e65f7281abfb63129e2d4aac419aa8cd1ea8781b4e9c053af23bd08c29abf3\"" Dec 13 14:08:27.459873 systemd[1]: Started cri-containerd-85e65f7281abfb63129e2d4aac419aa8cd1ea8781b4e9c053af23bd08c29abf3.scope. Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.478000 audit: BPF prog-id=167 op=LOAD Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4322 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653635663732383161626662363331323965326434616163343139 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4322 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653635663732383161626662363331323965326434616163343139 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit: BPF prog-id=168 op=LOAD Dec 13 14:08:27.479000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4322 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653635663732383161626662363331323965326434616163343139 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit: BPF prog-id=169 op=LOAD Dec 13 14:08:27.479000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4322 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653635663732383161626662363331323965326434616163343139 Dec 13 14:08:27.479000 audit: BPF prog-id=169 op=UNLOAD Dec 13 14:08:27.479000 audit: BPF prog-id=168 op=UNLOAD Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { perfmon } for pid=4366 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit[4366]: AVC avc: denied { bpf } for pid=4366 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:27.479000 audit: BPF prog-id=170 op=LOAD Dec 13 14:08:27.479000 audit[4366]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4322 pid=4366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.479000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3835653635663732383161626662363331323965326434616163343139 Dec 13 14:08:27.510440 systemd-networkd[1609]: caliac39513eccf: Gained IPv6LL Dec 13 14:08:27.510818 env[1454]: time="2024-12-13T14:08:27.510755700Z" level=info msg="StartContainer for \"85e65f7281abfb63129e2d4aac419aa8cd1ea8781b4e9c053af23bd08c29abf3\" returns successfully" Dec 13 14:08:27.712828 systemd[1]: run-netns-cni\x2d400d2e23\x2df291\x2daa0a\x2d2163\x2d86279dcb86bc.mount: Deactivated successfully. Dec 13 14:08:27.764849 kubelet[2484]: I1213 14:08:27.764787 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-nr68g" podStartSLOduration=32.764769329 podStartE2EDuration="32.764769329s" podCreationTimestamp="2024-12-13 14:07:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:27.763176181 +0000 UTC m=+38.290721754" watchObservedRunningTime="2024-12-13 14:08:27.764769329 +0000 UTC m=+38.292314862" Dec 13 14:08:27.822000 audit[4415]: NETFILTER_CFG table=filter:103 family=2 entries=12 op=nft_register_rule pid=4415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:27.822000 audit[4415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=fffff2bf72f0 a2=0 a3=1 items=0 ppid=2613 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.822000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:27.826000 audit[4415]: NETFILTER_CFG table=nat:104 family=2 entries=42 op=nft_register_rule pid=4415 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:27.826000 audit[4415]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=fffff2bf72f0 a2=0 a3=1 items=0 ppid=2613 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:27.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:28.217338 systemd-networkd[1609]: cali5a67dd7016b: Gained IPv6LL Dec 13 14:08:28.471426 systemd-networkd[1609]: calid8e59a9816b: Gained IPv6LL Dec 13 14:08:28.500820 env[1454]: time="2024-12-13T14:08:28.500765630Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:28.510935 env[1454]: time="2024-12-13T14:08:28.510894395Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:28.517596 env[1454]: time="2024-12-13T14:08:28.517535027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:28.522953 env[1454]: time="2024-12-13T14:08:28.522918187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:28.523374 env[1454]: time="2024-12-13T14:08:28.523342704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:5451b31bd8d0784796fa1204c4ec22975a270e21feadf2c5095fe41a38524c6c\"" Dec 13 14:08:28.526718 env[1454]: time="2024-12-13T14:08:28.525700567Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 14:08:28.527032 env[1454]: time="2024-12-13T14:08:28.526940158Z" level=info msg="CreateContainer within sandbox \"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:08:28.568317 env[1454]: time="2024-12-13T14:08:28.568266775Z" level=info msg="CreateContainer within sandbox \"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"8a65ab4a6103f95f5605b17f614d2d2b2d50dd5128d2a8cc625204a1959e78d1\"" Dec 13 14:08:28.570495 env[1454]: time="2024-12-13T14:08:28.570465759Z" level=info msg="StartContainer for \"8a65ab4a6103f95f5605b17f614d2d2b2d50dd5128d2a8cc625204a1959e78d1\"" Dec 13 14:08:28.600520 systemd-networkd[1609]: calib1754765d31: Gained IPv6LL Dec 13 14:08:28.603761 systemd[1]: Started cri-containerd-8a65ab4a6103f95f5605b17f614d2d2b2d50dd5128d2a8cc625204a1959e78d1.scope. Dec 13 14:08:28.610054 env[1454]: time="2024-12-13T14:08:28.602696083Z" level=info msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.626000 audit: BPF prog-id=171 op=LOAD Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3914 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363561623461363130336639356635363035623137663631346432 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3914 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363561623461363130336639356635363035623137663631346432 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit: BPF prog-id=172 op=LOAD Dec 13 14:08:28.627000 audit[4425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3914 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363561623461363130336639356635363035623137663631346432 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit: BPF prog-id=173 op=LOAD Dec 13 14:08:28.627000 audit[4425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3914 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363561623461363130336639356635363035623137663631346432 Dec 13 14:08:28.627000 audit: BPF prog-id=173 op=UNLOAD Dec 13 14:08:28.627000 audit: BPF prog-id=172 op=UNLOAD Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { perfmon } for pid=4425 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit[4425]: AVC avc: denied { bpf } for pid=4425 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:28.627000 audit: BPF prog-id=174 op=LOAD Dec 13 14:08:28.627000 audit[4425]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3914 pid=4425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3861363561623461363130336639356635363035623137663631346432 Dec 13 14:08:28.695189 env[1454]: time="2024-12-13T14:08:28.695125806Z" level=info msg="StartContainer for \"8a65ab4a6103f95f5605b17f614d2d2b2d50dd5128d2a8cc625204a1959e78d1\" returns successfully" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.708 [INFO][4461] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.708 [INFO][4461] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" iface="eth0" netns="/var/run/netns/cni-336406f9-c75a-b2a0-11c9-e8a41771fb58" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.708 [INFO][4461] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" iface="eth0" netns="/var/run/netns/cni-336406f9-c75a-b2a0-11c9-e8a41771fb58" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.709 [INFO][4461] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" iface="eth0" netns="/var/run/netns/cni-336406f9-c75a-b2a0-11c9-e8a41771fb58" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.709 [INFO][4461] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.709 [INFO][4461] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.744 [INFO][4478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.744 [INFO][4478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.745 [INFO][4478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.774 [WARNING][4478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.774 [INFO][4478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.781 [INFO][4478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:28.787823 env[1454]: 2024-12-13 14:08:28.782 [INFO][4461] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:28.786005 systemd[1]: run-netns-cni\x2d336406f9\x2dc75a\x2db2a0\x2d11c9\x2de8a41771fb58.mount: Deactivated successfully. Dec 13 14:08:28.789272 env[1454]: time="2024-12-13T14:08:28.789218197Z" level=info msg="TearDown network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" successfully" Dec 13 14:08:28.789272 env[1454]: time="2024-12-13T14:08:28.789266636Z" level=info msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" returns successfully" Dec 13 14:08:28.790020 env[1454]: time="2024-12-13T14:08:28.789982551Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-dvc9f,Uid:caf4ff8a-178b-40aa-b71b-81f5370f33a2,Namespace:calico-apiserver,Attempt:1,}" Dec 13 14:08:28.799000 audit[4495]: NETFILTER_CFG table=filter:105 family=2 entries=12 op=nft_register_rule pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:28.799000 audit[4495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffcabaf890 a2=0 a3=1 items=0 ppid=2613 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:28.818000 audit[4495]: NETFILTER_CFG table=nat:106 family=2 entries=54 op=nft_register_chain pid=4495 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:28.818000 audit[4495]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffcabaf890 a2=0 a3=1 items=0 ppid=2613 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:28.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:29.025796 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 14:08:29.025930 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib25ed0260b0: link becomes ready Dec 13 14:08:29.039179 systemd-networkd[1609]: calib25ed0260b0: Link UP Dec 13 14:08:29.039526 systemd-networkd[1609]: calib25ed0260b0: Gained carrier Dec 13 14:08:29.051734 kubelet[2484]: I1213 14:08:29.051671 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5665844f64-ntzm4" podStartSLOduration=24.717304699 podStartE2EDuration="27.05165072s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="2024-12-13 14:08:26.190376553 +0000 UTC m=+36.717922086" lastFinishedPulling="2024-12-13 14:08:28.524722534 +0000 UTC m=+39.052268107" observedRunningTime="2024-12-13 14:08:28.777390963 +0000 UTC m=+39.304936536" watchObservedRunningTime="2024-12-13 14:08:29.05165072 +0000 UTC m=+39.579196293" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.869 [INFO][4500] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.893 [INFO][4500] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0 calico-apiserver-5665844f64- calico-apiserver caf4ff8a-178b-40aa-b71b-81f5370f33a2 820 0 2024-12-13 14:08:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5665844f64 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-02735da4ec calico-apiserver-5665844f64-dvc9f eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calib25ed0260b0 [] []}} ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.893 [INFO][4500] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.941 [INFO][4512] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" HandleID="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.957 [INFO][4512] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" HandleID="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003167b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-02735da4ec", "pod":"calico-apiserver-5665844f64-dvc9f", "timestamp":"2024-12-13 14:08:28.941414802 +0000 UTC"}, Hostname:"ci-3510.3.6-a-02735da4ec", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.957 [INFO][4512] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.957 [INFO][4512] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.957 [INFO][4512] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-02735da4ec' Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.963 [INFO][4512] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.968 [INFO][4512] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.974 [INFO][4512] ipam/ipam.go 489: Trying affinity for 192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.976 [INFO][4512] ipam/ipam.go 155: Attempting to load block cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.978 [INFO][4512] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.82.128/26 host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.978 [INFO][4512] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.82.128/26 handle="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.984 [INFO][4512] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373 Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:28.990 [INFO][4512] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.82.128/26 handle="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:29.006 [INFO][4512] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.82.134/26] block=192.168.82.128/26 handle="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:29.006 [INFO][4512] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.82.134/26] handle="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" host="ci-3510.3.6-a-02735da4ec" Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:29.007 [INFO][4512] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:29.054373 env[1454]: 2024-12-13 14:08:29.007 [INFO][4512] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.82.134/26] IPv6=[] ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" HandleID="k8s-pod-network.cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.008 [INFO][4500] cni-plugin/k8s.go 386: Populated endpoint ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"caf4ff8a-178b-40aa-b71b-81f5370f33a2", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"", Pod:"calico-apiserver-5665844f64-dvc9f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib25ed0260b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.008 [INFO][4500] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.82.134/32] ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.008 [INFO][4500] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib25ed0260b0 ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.038 [INFO][4500] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.041 [INFO][4500] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"caf4ff8a-178b-40aa-b71b-81f5370f33a2", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373", Pod:"calico-apiserver-5665844f64-dvc9f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib25ed0260b0", MAC:"22:93:06:82:f3:e7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:29.055022 env[1454]: 2024-12-13 14:08:29.053 [INFO][4500] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373" Namespace="calico-apiserver" Pod="calico-apiserver-5665844f64-dvc9f" WorkloadEndpoint="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:29.079261 env[1454]: time="2024-12-13T14:08:29.078132770Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 14:08:29.079261 env[1454]: time="2024-12-13T14:08:29.078173049Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 14:08:29.079261 env[1454]: time="2024-12-13T14:08:29.078183969Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 14:08:29.079261 env[1454]: time="2024-12-13T14:08:29.078310328Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373 pid=4539 runtime=io.containerd.runc.v2 Dec 13 14:08:29.092966 systemd[1]: Started cri-containerd-cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373.scope. Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit: BPF prog-id=175 op=LOAD Dec 13 14:08:29.116000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4539 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362666436376439626639323234636166623731633437653234316636 Dec 13 14:08:29.116000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.116000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4539 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362666436376439626639323234636166623731633437653234316636 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit: BPF prog-id=176 op=LOAD Dec 13 14:08:29.117000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4539 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362666436376439626639323234636166623731633437653234316636 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit: BPF prog-id=177 op=LOAD Dec 13 14:08:29.117000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4539 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362666436376439626639323234636166623731633437653234316636 Dec 13 14:08:29.117000 audit: BPF prog-id=177 op=UNLOAD Dec 13 14:08:29.117000 audit: BPF prog-id=176 op=UNLOAD Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { perfmon } for pid=4549 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit[4549]: AVC avc: denied { bpf } for pid=4549 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.117000 audit: BPF prog-id=178 op=LOAD Dec 13 14:08:29.117000 audit[4549]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4539 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362666436376439626639323234636166623731633437653234316636 Dec 13 14:08:29.145074 env[1454]: time="2024-12-13T14:08:29.145029727Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5665844f64-dvc9f,Uid:caf4ff8a-178b-40aa-b71b-81f5370f33a2,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373\"" Dec 13 14:08:29.148468 env[1454]: time="2024-12-13T14:08:29.148429583Z" level=info msg="CreateContainer within sandbox \"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 14:08:29.174397 systemd-networkd[1609]: calica26861d169: Gained IPv6LL Dec 13 14:08:29.182021 env[1454]: time="2024-12-13T14:08:29.181914261Z" level=info msg="CreateContainer within sandbox \"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"68193f0310d3fe0340710d5ce7acd4ab4d7729a736d0d652891271596e770421\"" Dec 13 14:08:29.182801 env[1454]: time="2024-12-13T14:08:29.182769175Z" level=info msg="StartContainer for \"68193f0310d3fe0340710d5ce7acd4ab4d7729a736d0d652891271596e770421\"" Dec 13 14:08:29.201283 systemd[1]: Started cri-containerd-68193f0310d3fe0340710d5ce7acd4ab4d7729a736d0d652891271596e770421.scope. Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.217000 audit: BPF prog-id=179 op=LOAD Dec 13 14:08:29.218000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.218000 audit[4580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4539 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313933663033313064336665303334303731306435636537616364 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4539 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313933663033313064336665303334303731306435636537616364 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.219000 audit: BPF prog-id=180 op=LOAD Dec 13 14:08:29.219000 audit[4580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4539 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313933663033313064336665303334303731306435636537616364 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit: BPF prog-id=181 op=LOAD Dec 13 14:08:29.220000 audit[4580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4539 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313933663033313064336665303334303731306435636537616364 Dec 13 14:08:29.220000 audit: BPF prog-id=181 op=UNLOAD Dec 13 14:08:29.220000 audit: BPF prog-id=180 op=UNLOAD Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { perfmon } for pid=4580 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit[4580]: AVC avc: denied { bpf } for pid=4580 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:29.220000 audit: BPF prog-id=182 op=LOAD Dec 13 14:08:29.220000 audit[4580]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4539 pid=4580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.220000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638313933663033313064336665303334303731306435636537616364 Dec 13 14:08:29.247131 env[1454]: time="2024-12-13T14:08:29.247063272Z" level=info msg="StartContainer for \"68193f0310d3fe0340710d5ce7acd4ab4d7729a736d0d652891271596e770421\" returns successfully" Dec 13 14:08:29.787322 systemd[1]: run-containerd-runc-k8s.io-cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373-runc.cob96g.mount: Deactivated successfully. Dec 13 14:08:29.805000 audit[4611]: NETFILTER_CFG table=filter:107 family=2 entries=12 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:29.805000 audit[4611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4504 a0=3 a1=ffffec7469b0 a2=0 a3=1 items=0 ppid=2613 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.805000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:29.812000 audit[4611]: NETFILTER_CFG table=nat:108 family=2 entries=18 op=nft_register_rule pid=4611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:29.812000 audit[4611]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=ffffec7469b0 a2=0 a3=1 items=0 ppid=2613 pid=4611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:29.812000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:30.273535 kubelet[2484]: I1213 14:08:30.273493 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:30.301532 kubelet[2484]: I1213 14:08:30.301372 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5665844f64-dvc9f" podStartSLOduration=28.301356387 podStartE2EDuration="28.301356387s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 14:08:29.778194884 +0000 UTC m=+40.305740417" watchObservedRunningTime="2024-12-13 14:08:30.301356387 +0000 UTC m=+40.828901920" Dec 13 14:08:30.646368 systemd-networkd[1609]: calib25ed0260b0: Gained IPv6LL Dec 13 14:08:30.665000 audit[4442]: AVC avc: denied { watch } for pid=4442 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.4171902479/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c665 tclass=file permissive=0 Dec 13 14:08:30.665000 audit[4442]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000374c80 a2=fc6 a3=0 items=0 ppid=3914 pid=4442 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 key=(null) Dec 13 14:08:30.665000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:08:30.676000 audit[4589]: AVC avc: denied { watch } for pid=4589 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.1978627435/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c605 tclass=file permissive=0 Dec 13 14:08:30.676000 audit[4589]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000331ec0 a2=fc6 a3=0 items=0 ppid=4539 pid=4589 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 key=(null) Dec 13 14:08:30.676000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:08:30.764891 kubelet[2484]: I1213 14:08:30.764841 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:30.826000 audit[4636]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:30.826000 audit[4636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffc3036240 a2=0 a3=1 items=0 ppid=2613 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:30.830000 audit[4636]: NETFILTER_CFG table=nat:110 family=2 entries=32 op=nft_register_chain pid=4636 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:30.830000 audit[4636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12156 a0=3 a1=ffffc3036240 a2=0 a3=1 items=0 ppid=2613 pid=4636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:30.830000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.230308 kernel: kauditd_printk_skb: 602 callbacks suppressed Dec 13 14:08:31.230393 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.266919 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.288970 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.308190 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.330302 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.352313 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.379300 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.402411 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.402567 kernel: audit: type=1400 audit(1734098911.224:1223): avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.224000 audit: BPF prog-id=183 op=LOAD Dec 13 14:08:31.426068 kernel: audit: type=1334 audit(1734098911.224:1223): prog-id=183 op=LOAD Dec 13 14:08:31.224000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffffd3ccf48 a2=98 a3=fffffd3ccf38 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.224000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.229000 audit: BPF prog-id=183 op=UNLOAD Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.229000 audit: BPF prog-id=184 op=LOAD Dec 13 14:08:31.229000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffd3ccbd8 a2=74 a3=95 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.229000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.247000 audit: BPF prog-id=184 op=UNLOAD Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.247000 audit: BPF prog-id=185 op=LOAD Dec 13 14:08:31.247000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffd3ccc38 a2=94 a3=2 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.247000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.247000 audit: BPF prog-id=185 op=UNLOAD Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit: BPF prog-id=186 op=LOAD Dec 13 14:08:31.688000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=fffffd3ccbf8 a2=40 a3=fffffd3ccc28 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.688000 audit: BPF prog-id=186 op=UNLOAD Dec 13 14:08:31.688000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.688000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=fffffd3ccd10 a2=50 a3=0 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.688000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3ccc68 a2=28 a3=fffffd3ccd98 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd3ccc98 a2=28 a3=fffffd3ccdc8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd3ccb48 a2=28 a3=fffffd3ccc78 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3cccb8 a2=28 a3=fffffd3ccde8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3ccc98 a2=28 a3=fffffd3ccdc8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3ccc88 a2=28 a3=fffffd3ccdb8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3cccb8 a2=28 a3=fffffd3ccde8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd3ccc98 a2=28 a3=fffffd3ccdc8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd3cccb8 a2=28 a3=fffffd3ccde8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.697000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.697000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=fffffd3ccc88 a2=28 a3=fffffd3ccdb8 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.697000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=fffffd3ccd08 a2=28 a3=fffffd3cce48 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffd3cca40 a2=50 a3=0 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit: BPF prog-id=187 op=LOAD Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=fffffd3cca48 a2=94 a3=5 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit: BPF prog-id=187 op=UNLOAD Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=fffffd3ccb50 a2=50 a3=0 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=fffffd3ccc98 a2=4 a3=3 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { confidentiality } for pid=4661 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffd3ccc78 a2=94 a3=6 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { confidentiality } for pid=4661 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffd3cc448 a2=94 a3=83 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { perfmon } for pid=4661 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { bpf } for pid=4661 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.698000 audit[4661]: AVC avc: denied { confidentiality } for pid=4661 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:31.698000 audit[4661]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=fffffd3cc448 a2=94 a3=83 items=0 ppid=4645 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.698000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit: BPF prog-id=188 op=LOAD Dec 13 14:08:31.707000 audit[4697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda5280c8 a2=98 a3=ffffda5280b8 items=0 ppid=4645 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.707000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:31.707000 audit: BPF prog-id=188 op=UNLOAD Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit: BPF prog-id=189 op=LOAD Dec 13 14:08:31.707000 audit[4697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda527f78 a2=74 a3=95 items=0 ppid=4645 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.707000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:31.707000 audit: BPF prog-id=189 op=UNLOAD Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { perfmon } for pid=4697 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit[4697]: AVC avc: denied { bpf } for pid=4697 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.707000 audit: BPF prog-id=190 op=LOAD Dec 13 14:08:31.707000 audit[4697]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffda527fa8 a2=40 a3=ffffda527fd8 items=0 ppid=4645 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.707000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 14:08:31.707000 audit: BPF prog-id=190 op=UNLOAD Dec 13 14:08:31.953810 systemd-networkd[1609]: vxlan.calico: Link UP Dec 13 14:08:31.953822 systemd-networkd[1609]: vxlan.calico: Gained carrier Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.985000 audit: BPF prog-id=191 op=LOAD Dec 13 14:08:31.985000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecce6e28 a2=98 a3=ffffecce6e18 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.985000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.988000 audit: BPF prog-id=191 op=UNLOAD Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.988000 audit: BPF prog-id=192 op=LOAD Dec 13 14:08:31.988000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecce6b08 a2=74 a3=95 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit: BPF prog-id=192 op=UNLOAD Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit: BPF prog-id=193 op=LOAD Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffecce6b68 a2=94 a3=2 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit: BPF prog-id=193 op=UNLOAD Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6b98 a2=28 a3=ffffecce6cc8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecce6bc8 a2=28 a3=ffffecce6cf8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecce6a78 a2=28 a3=ffffecce6ba8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6be8 a2=28 a3=ffffecce6d18 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6bc8 a2=28 a3=ffffecce6cf8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6bb8 a2=28 a3=ffffecce6ce8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6be8 a2=28 a3=ffffecce6d18 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecce6bc8 a2=28 a3=ffffecce6cf8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecce6be8 a2=28 a3=ffffecce6d18 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffecce6bb8 a2=28 a3=ffffecce6ce8 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=12 a1=ffffecce6c38 a2=28 a3=ffffecce6d78 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.989000 audit: BPF prog-id=194 op=LOAD Dec 13 14:08:31.989000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecce6a58 a2=40 a3=ffffecce6a88 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.989000 audit: BPF prog-id=194 op=UNLOAD Dec 13 14:08:31.991000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.991000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffecce6a80 a2=50 a3=0 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.991000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=0 a1=ffffecce6a80 a2=50 a3=0 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit: BPF prog-id=195 op=LOAD Dec 13 14:08:31.992000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecce61e8 a2=94 a3=2 items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.992000 audit: BPF prog-id=195 op=UNLOAD Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { perfmon } for pid=4725 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit[4725]: AVC avc: denied { bpf } for pid=4725 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.992000 audit: BPF prog-id=196 op=LOAD Dec 13 14:08:31.992000 audit[4725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffecce6378 a2=94 a3=2d items=0 ppid=4645 pid=4725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.992000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit: BPF prog-id=197 op=LOAD Dec 13 14:08:31.995000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffcf21abc8 a2=98 a3=ffffcf21abb8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:31.995000 audit: BPF prog-id=197 op=UNLOAD Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.995000 audit: BPF prog-id=198 op=LOAD Dec 13 14:08:31.995000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcf21a858 a2=74 a3=95 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.995000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:31.996000 audit: BPF prog-id=198 op=UNLOAD Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:31.996000 audit: BPF prog-id=199 op=LOAD Dec 13 14:08:31.996000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcf21a8b8 a2=94 a3=2 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:31.996000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:31.996000 audit: BPF prog-id=199 op=UNLOAD Dec 13 14:08:32.022139 env[1454]: time="2024-12-13T14:08:32.021519298Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:32.035228 env[1454]: time="2024-12-13T14:08:32.034989566Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:32.041701 env[1454]: time="2024-12-13T14:08:32.041660480Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:32.046810 env[1454]: time="2024-12-13T14:08:32.046766405Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:32.047662 env[1454]: time="2024-12-13T14:08:32.047633839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:32c335fdb9d757e7ba6a76a9cfa8d292a5a229101ae7ea37b42f53c28adf2db1\"" Dec 13 14:08:32.052615 env[1454]: time="2024-12-13T14:08:32.052582645Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 14:08:32.070498 env[1454]: time="2024-12-13T14:08:32.070301923Z" level=info msg="CreateContainer within sandbox \"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 14:08:32.100738 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1485800929.mount: Deactivated successfully. Dec 13 14:08:32.116180 env[1454]: time="2024-12-13T14:08:32.116123768Z" level=info msg="CreateContainer within sandbox \"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1\"" Dec 13 14:08:32.116864 env[1454]: time="2024-12-13T14:08:32.116834283Z" level=info msg="StartContainer for \"c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1\"" Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.120000 audit: BPF prog-id=200 op=LOAD Dec 13 14:08:32.120000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffcf21a878 a2=40 a3=ffffcf21a8a8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.120000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.121000 audit: BPF prog-id=200 op=UNLOAD Dec 13 14:08:32.121000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.121000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffcf21a990 a2=50 a3=0 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.121000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.136000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.136000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a8e8 a2=28 a3=ffffcf21aa18 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.136000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.137000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.137000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf21a918 a2=28 a3=ffffcf21aa48 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.137000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.137000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf21a7c8 a2=28 a3=ffffcf21a8f8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.137000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.137000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a938 a2=28 a3=ffffcf21aa68 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.137000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.137000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a918 a2=28 a3=ffffcf21aa48 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.137000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a908 a2=28 a3=ffffcf21aa38 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a938 a2=28 a3=ffffcf21aa68 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf21a918 a2=28 a3=ffffcf21aa48 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf21a938 a2=28 a3=ffffcf21aa68 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=12 a1=ffffcf21a908 a2=28 a3=ffffcf21aa38 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffcf21a988 a2=28 a3=ffffcf21aac8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcf21a6c0 a2=50 a3=0 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.138000 audit: BPF prog-id=201 op=LOAD Dec 13 14:08:32.138000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffcf21a6c8 a2=94 a3=5 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.138000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.139000 audit: BPF prog-id=201 op=UNLOAD Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffcf21a7d0 a2=50 a3=0 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=16 a1=ffffcf21a918 a2=4 a3=3 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.139000 audit[4730]: AVC avc: denied { confidentiality } for pid=4730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:32.139000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcf21a8f8 a2=94 a3=6 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.139000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.140000 audit[4730]: AVC avc: denied { confidentiality } for pid=4730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:32.140000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcf21a0c8 a2=94 a3=83 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.140000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { perfmon } for pid=4730 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.141000 audit[4730]: AVC avc: denied { confidentiality } for pid=4730 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 14:08:32.141000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=5 a1=ffffcf21a0c8 a2=94 a3=83 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.141000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.142000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.142000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf21bb08 a2=10 a3=ffffcf21bbf8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.142000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.142000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf21b9c8 a2=10 a3=ffffcf21bab8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.142000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.142000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf21b938 a2=10 a3=ffffcf21bab8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.142000 audit[4730]: AVC avc: denied { bpf } for pid=4730 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.142000 audit[4730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcf21b938 a2=10 a3=ffffcf21bab8 items=0 ppid=4645 pid=4730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.142000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 14:08:32.144136 systemd[1]: Started cri-containerd-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1.scope. Dec 13 14:08:32.157000 audit: BPF prog-id=196 op=UNLOAD Dec 13 14:08:32.157000 audit[4754]: SYSCALL arch=c00000b7 syscall=144 success=yes exit=0 a0=0 a1=ffffbe5abb40 a2=1 a3=0 items=0 ppid=4739 pid=4754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc:[2:INIT]" exe=2F6D656D66643A72756E635F636C6F6E65643A2F70726F632F73656C662F657865202864656C6574656429 subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.157000 audit: PROCTITLE proctitle=72756E6300696E6974 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit: BPF prog-id=202 op=LOAD Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4219 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646130643466386333343233646237333034663133353561616661 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4219 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646130643466386333343233646237333034663133353561616661 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit: BPF prog-id=203 op=LOAD Dec 13 14:08:32.168000 audit[4739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4219 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646130643466386333343233646237333034663133353561616661 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.168000 audit: BPF prog-id=204 op=LOAD Dec 13 14:08:32.168000 audit[4739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4219 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.168000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646130643466386333343233646237333034663133353561616661 Dec 13 14:08:32.168000 audit: BPF prog-id=204 op=UNLOAD Dec 13 14:08:32.168000 audit: BPF prog-id=203 op=UNLOAD Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { perfmon } for pid=4739 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit[4739]: AVC avc: denied { bpf } for pid=4739 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:32.169000 audit: BPF prog-id=205 op=LOAD Dec 13 14:08:32.169000 audit[4739]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4219 pid=4739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337646130643466386333343233646237333034663133353561616661 Dec 13 14:08:32.301877 env[1454]: time="2024-12-13T14:08:32.301830851Z" level=info msg="StartContainer for \"c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1\" returns successfully" Dec 13 14:08:32.436000 audit[4798]: NETFILTER_CFG table=mangle:111 family=2 entries=16 op=nft_register_chain pid=4798 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:32.436000 audit[4798]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffffa24640 a2=0 a3=ffffb0c2efa8 items=0 ppid=4645 pid=4798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:32.441000 audit[4797]: NETFILTER_CFG table=nat:112 family=2 entries=15 op=nft_register_chain pid=4797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:32.441000 audit[4797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffdb33a900 a2=0 a3=ffff7fc6dfa8 items=0 ppid=4645 pid=4797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.441000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:32.461000 audit[4801]: NETFILTER_CFG table=filter:113 family=2 entries=215 op=nft_register_chain pid=4801 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:32.461000 audit[4801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=125772 a0=3 a1=ffffd40534a0 a2=0 a3=ffff885affa8 items=0 ppid=4645 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.461000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:32.471000 audit[4796]: NETFILTER_CFG table=raw:114 family=2 entries=21 op=nft_register_chain pid=4796 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 14:08:32.471000 audit[4796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8452 a0=3 a1=ffffef11c870 a2=0 a3=ffff8a4a1fa8 items=0 ppid=4645 pid=4796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:32.471000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 14:08:32.790742 kubelet[2484]: I1213 14:08:32.789730 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-544bc7fb8-rpkdk" podStartSLOduration=25.937000865 podStartE2EDuration="30.789704815s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="2024-12-13 14:08:27.199723656 +0000 UTC m=+37.727269229" lastFinishedPulling="2024-12-13 14:08:32.052427606 +0000 UTC m=+42.579973179" observedRunningTime="2024-12-13 14:08:32.788012307 +0000 UTC m=+43.315557880" watchObservedRunningTime="2024-12-13 14:08:32.789704815 +0000 UTC m=+43.317250388" Dec 13 14:08:33.601281 env[1454]: time="2024-12-13T14:08:33.598838792Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:33.607428 env[1454]: time="2024-12-13T14:08:33.607364854Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:33.617612 env[1454]: time="2024-12-13T14:08:33.617563385Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:33.624508 env[1454]: time="2024-12-13T14:08:33.624455338Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:33.625129 env[1454]: time="2024-12-13T14:08:33.625095254Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:3c11734f3001b7070e7e2b5e64938f89891cf8c44f8997e86aa23c5d5bf70163\"" Dec 13 14:08:33.629762 env[1454]: time="2024-12-13T14:08:33.629718703Z" level=info msg="CreateContainer within sandbox \"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 14:08:33.660906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3324506252.mount: Deactivated successfully. Dec 13 14:08:33.676956 env[1454]: time="2024-12-13T14:08:33.676909143Z" level=info msg="CreateContainer within sandbox \"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a6af8969f39a36066baf402771b579f45f041fb63fcf898fbdc5a04b7d1d0815\"" Dec 13 14:08:33.679506 env[1454]: time="2024-12-13T14:08:33.679392726Z" level=info msg="StartContainer for \"a6af8969f39a36066baf402771b579f45f041fb63fcf898fbdc5a04b7d1d0815\"" Dec 13 14:08:33.705319 systemd[1]: Started cri-containerd-a6af8969f39a36066baf402771b579f45f041fb63fcf898fbdc5a04b7d1d0815.scope. Dec 13 14:08:33.726000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.726000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4271 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:33.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136616638393639663339613336303636626166343032373731623537 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit: BPF prog-id=206 op=LOAD Dec 13 14:08:33.727000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4271 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136616638393639663339613336303636626166343032373731623537 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit: BPF prog-id=207 op=LOAD Dec 13 14:08:33.727000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4271 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136616638393639663339613336303636626166343032373731623537 Dec 13 14:08:33.727000 audit: BPF prog-id=207 op=UNLOAD Dec 13 14:08:33.727000 audit: BPF prog-id=206 op=UNLOAD Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { perfmon } for pid=4818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit[4818]: AVC avc: denied { bpf } for pid=4818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:33.727000 audit: BPF prog-id=208 op=LOAD Dec 13 14:08:33.727000 audit[4818]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4271 pid=4818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:33.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136616638393639663339613336303636626166343032373731623537 Dec 13 14:08:33.746645 env[1454]: time="2024-12-13T14:08:33.746599751Z" level=info msg="StartContainer for \"a6af8969f39a36066baf402771b579f45f041fb63fcf898fbdc5a04b7d1d0815\" returns successfully" Dec 13 14:08:33.750962 env[1454]: time="2024-12-13T14:08:33.750920202Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 14:08:33.772740 kubelet[2484]: I1213 14:08:33.772712 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:33.782408 systemd-networkd[1609]: vxlan.calico: Gained IPv6LL Dec 13 14:08:34.058372 systemd[1]: run-containerd-runc-k8s.io-a6af8969f39a36066baf402771b579f45f041fb63fcf898fbdc5a04b7d1d0815-runc.4z4tF1.mount: Deactivated successfully. Dec 13 14:08:35.261805 env[1454]: time="2024-12-13T14:08:35.261744718Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.270043 env[1454]: time="2024-12-13T14:08:35.269988824Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.274690 env[1454]: time="2024-12-13T14:08:35.274654233Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.280590 env[1454]: time="2024-12-13T14:08:35.280547314Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 14:08:35.281195 env[1454]: time="2024-12-13T14:08:35.281156630Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:3eb557f7694f230afd24a75a691bcda4c0a7bfe87a981386dcd4ecf2b0701349\"" Dec 13 14:08:35.289560 env[1454]: time="2024-12-13T14:08:35.289525375Z" level=info msg="CreateContainer within sandbox \"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 14:08:35.319525 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2650051994.mount: Deactivated successfully. Dec 13 14:08:35.336152 env[1454]: time="2024-12-13T14:08:35.336098189Z" level=info msg="CreateContainer within sandbox \"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ab641265dc5ce5ebc40eff6fefcb0677cdd6217d1dceca8ec4a5d53bcb414bb8\"" Dec 13 14:08:35.338162 env[1454]: time="2024-12-13T14:08:35.338130216Z" level=info msg="StartContainer for \"ab641265dc5ce5ebc40eff6fefcb0677cdd6217d1dceca8ec4a5d53bcb414bb8\"" Dec 13 14:08:35.374333 systemd[1]: run-containerd-runc-k8s.io-ab641265dc5ce5ebc40eff6fefcb0677cdd6217d1dceca8ec4a5d53bcb414bb8-runc.7JEZVZ.mount: Deactivated successfully. Dec 13 14:08:35.375967 systemd[1]: Started cri-containerd-ab641265dc5ce5ebc40eff6fefcb0677cdd6217d1dceca8ec4a5d53bcb414bb8.scope. Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4271 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363431323635646335636535656263343065666636666566636230 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit: BPF prog-id=209 op=LOAD Dec 13 14:08:35.390000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4271 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363431323635646335636535656263343065666636666566636230 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit: BPF prog-id=210 op=LOAD Dec 13 14:08:35.390000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4271 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363431323635646335636535656263343065666636666566636230 Dec 13 14:08:35.390000 audit: BPF prog-id=210 op=UNLOAD Dec 13 14:08:35.390000 audit: BPF prog-id=209 op=UNLOAD Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { perfmon } for pid=4852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit[4852]: AVC avc: denied { bpf } for pid=4852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 14:08:35.390000 audit: BPF prog-id=211 op=LOAD Dec 13 14:08:35.390000 audit[4852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4271 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:35.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162363431323635646335636535656263343065666636666566636230 Dec 13 14:08:35.411317 env[1454]: time="2024-12-13T14:08:35.411262255Z" level=info msg="StartContainer for \"ab641265dc5ce5ebc40eff6fefcb0677cdd6217d1dceca8ec4a5d53bcb414bb8\" returns successfully" Dec 13 14:08:35.677428 kubelet[2484]: I1213 14:08:35.677389 2484 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 14:08:35.677428 kubelet[2484]: I1213 14:08:35.677430 2484 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 14:08:36.220710 kubelet[2484]: I1213 14:08:36.220657 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:36.277702 kubelet[2484]: I1213 14:08:36.277242 2484 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-nrh6t" podStartSLOduration=26.290762462 podStartE2EDuration="34.277221865s" podCreationTimestamp="2024-12-13 14:08:02 +0000 UTC" firstStartedPulling="2024-12-13 14:08:27.2958783 +0000 UTC m=+37.823423873" lastFinishedPulling="2024-12-13 14:08:35.282337703 +0000 UTC m=+45.809883276" observedRunningTime="2024-12-13 14:08:35.800991291 +0000 UTC m=+46.328536864" watchObservedRunningTime="2024-12-13 14:08:36.277221865 +0000 UTC m=+46.804767438" Dec 13 14:08:38.620902 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.Sirubw.mount: Deactivated successfully. Dec 13 14:08:46.595225 kernel: kauditd_printk_skb: 615 callbacks suppressed Dec 13 14:08:46.595502 kernel: audit: type=1400 audit(1734098926.587:1348): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.587000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.587000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.641276 kernel: audit: type=1400 audit(1734098926.587:1349): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.641387 kernel: audit: type=1300 audit(1734098926.587:1349): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400a19bb60 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.587000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400a19bb60 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.699240 kernel: audit: type=1327 audit(1734098926.587:1349): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.699411 kernel: audit: type=1300 audit(1734098926.587:1348): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400a19bb30 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.587000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400a19bb30 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.587000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.754494 kernel: audit: type=1327 audit(1734098926.587:1348): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.595000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.777465 kernel: audit: type=1400 audit(1734098926.595:1350): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.595000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40075bb140 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.806611 kernel: audit: type=1300 audit(1734098926.595:1350): arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40075bb140 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.832919 kernel: audit: type=1327 audit(1734098926.595:1350): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.595000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.857472 kernel: audit: type=1400 audit(1734098926.595:1351): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.595000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4004553080 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.595000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.595000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400a19bd10 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.595000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.596000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.596000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400a19be00 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:08:46.596000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:08:46.871000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.871000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:46.871000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40016f4ea0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:46.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:46.871000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000a683f0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:46.871000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:48.611336 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.yNG8uu.mount: Deactivated successfully. Dec 13 14:08:49.588366 env[1454]: time="2024-12-13T14:08:49.588323912Z" level=info msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.637 [WARNING][4994] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"caf4ff8a-178b-40aa-b71b-81f5370f33a2", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373", Pod:"calico-apiserver-5665844f64-dvc9f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib25ed0260b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.637 [INFO][4994] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.637 [INFO][4994] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" iface="eth0" netns="" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.637 [INFO][4994] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.637 [INFO][4994] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.671 [INFO][5003] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.671 [INFO][5003] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.671 [INFO][5003] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.679 [WARNING][5003] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.679 [INFO][5003] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.681 [INFO][5003] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:49.684712 env[1454]: 2024-12-13 14:08:49.682 [INFO][4994] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.685323 env[1454]: time="2024-12-13T14:08:49.685287979Z" level=info msg="TearDown network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" successfully" Dec 13 14:08:49.685443 env[1454]: time="2024-12-13T14:08:49.685408618Z" level=info msg="StopPodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" returns successfully" Dec 13 14:08:49.686290 env[1454]: time="2024-12-13T14:08:49.686152534Z" level=info msg="RemovePodSandbox for \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" Dec 13 14:08:49.686387 env[1454]: time="2024-12-13T14:08:49.686239654Z" level=info msg="Forcibly stopping sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\"" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.727 [WARNING][5022] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"caf4ff8a-178b-40aa-b71b-81f5370f33a2", ResourceVersion:"833", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"cbfd67d9bf9224cafb71c47e241f64449dfff96f42354016fd96917accd38373", Pod:"calico-apiserver-5665844f64-dvc9f", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calib25ed0260b0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.727 [INFO][5022] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.727 [INFO][5022] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" iface="eth0" netns="" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.727 [INFO][5022] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.727 [INFO][5022] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.747 [INFO][5028] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.747 [INFO][5028] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.747 [INFO][5028] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.757 [WARNING][5028] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.757 [INFO][5028] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" HandleID="k8s-pod-network.274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--dvc9f-eth0" Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.759 [INFO][5028] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:49.763349 env[1454]: 2024-12-13 14:08:49.761 [INFO][5022] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd" Dec 13 14:08:49.763813 env[1454]: time="2024-12-13T14:08:49.763383270Z" level=info msg="TearDown network for sandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" successfully" Dec 13 14:08:49.774829 env[1454]: time="2024-12-13T14:08:49.774790447Z" level=info msg="RemovePodSandbox \"274493871388f2d00b492803800ebaafc4e8cde8bf0e7227b88bf45210f649fd\" returns successfully" Dec 13 14:08:49.775823 env[1454]: time="2024-12-13T14:08:49.775794281Z" level=info msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.851 [WARNING][5050] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68671505-86de-4265-ad77-6c366467882e", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f", Pod:"csi-node-driver-nrh6t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib1754765d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.851 [INFO][5050] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.851 [INFO][5050] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" iface="eth0" netns="" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.851 [INFO][5050] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.851 [INFO][5050] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.874 [INFO][5056] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.874 [INFO][5056] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.874 [INFO][5056] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.883 [WARNING][5056] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.883 [INFO][5056] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.885 [INFO][5056] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:49.889419 env[1454]: 2024-12-13 14:08:49.887 [INFO][5050] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.890016 env[1454]: time="2024-12-13T14:08:49.889975453Z" level=info msg="TearDown network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" successfully" Dec 13 14:08:49.890090 env[1454]: time="2024-12-13T14:08:49.890074893Z" level=info msg="StopPodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" returns successfully" Dec 13 14:08:49.890704 env[1454]: time="2024-12-13T14:08:49.890678009Z" level=info msg="RemovePodSandbox for \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" Dec 13 14:08:49.890868 env[1454]: time="2024-12-13T14:08:49.890830689Z" level=info msg="Forcibly stopping sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\"" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.936 [WARNING][5075] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"68671505-86de-4265-ad77-6c366467882e", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"2a31283fe6e5537fd233e6eb59ac89c29e5e2b1339086bb7b97d1282ed11170f", Pod:"csi-node-driver-nrh6t", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.82.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib1754765d31", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.937 [INFO][5075] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.937 [INFO][5075] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" iface="eth0" netns="" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.937 [INFO][5075] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.937 [INFO][5075] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.959 [INFO][5081] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.959 [INFO][5081] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.959 [INFO][5081] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.971 [WARNING][5081] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.971 [INFO][5081] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" HandleID="k8s-pod-network.b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Workload="ci--3510.3.6--a--02735da4ec-k8s-csi--node--driver--nrh6t-eth0" Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.973 [INFO][5081] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:49.975920 env[1454]: 2024-12-13 14:08:49.974 [INFO][5075] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae" Dec 13 14:08:49.976476 env[1454]: time="2024-12-13T14:08:49.975953180Z" level=info msg="TearDown network for sandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" successfully" Dec 13 14:08:49.984299 env[1454]: time="2024-12-13T14:08:49.984248015Z" level=info msg="RemovePodSandbox \"b28d4764a6770450701abd3b995b51da4fdf3f5f50773070e4493d3f71d770ae\" returns successfully" Dec 13 14:08:49.984851 env[1454]: time="2024-12-13T14:08:49.984824172Z" level=info msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.030 [WARNING][5100] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2470d079-9bb7-4446-b26c-e5f6c4b88b84", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90", Pod:"coredns-6f6b679f8f-nr68g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calica26861d169", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.031 [INFO][5100] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.031 [INFO][5100] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" iface="eth0" netns="" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.031 [INFO][5100] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.031 [INFO][5100] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.055 [INFO][5106] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.056 [INFO][5106] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.056 [INFO][5106] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.065 [WARNING][5106] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.065 [INFO][5106] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.067 [INFO][5106] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.070083 env[1454]: 2024-12-13 14:08:50.069 [INFO][5100] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.070684 env[1454]: time="2024-12-13T14:08:50.070648304Z" level=info msg="TearDown network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" successfully" Dec 13 14:08:50.070856 env[1454]: time="2024-12-13T14:08:50.070833303Z" level=info msg="StopPodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" returns successfully" Dec 13 14:08:50.071690 env[1454]: time="2024-12-13T14:08:50.071663018Z" level=info msg="RemovePodSandbox for \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" Dec 13 14:08:50.071976 env[1454]: time="2024-12-13T14:08:50.071927337Z" level=info msg="Forcibly stopping sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\"" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.124 [WARNING][5124] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2470d079-9bb7-4446-b26c-e5f6c4b88b84", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"5391f72d8485b7f1a4b5e46cd3c9bbf9c9b1eb77ae35af0d86b21b6715ef6c90", Pod:"coredns-6f6b679f8f-nr68g", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calica26861d169", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.124 [INFO][5124] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.124 [INFO][5124] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" iface="eth0" netns="" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.124 [INFO][5124] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.124 [INFO][5124] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.155 [INFO][5130] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.155 [INFO][5130] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.155 [INFO][5130] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.164 [WARNING][5130] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.165 [INFO][5130] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" HandleID="k8s-pod-network.8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--nr68g-eth0" Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.167 [INFO][5130] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.171632 env[1454]: 2024-12-13 14:08:50.169 [INFO][5124] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6" Dec 13 14:08:50.172246 env[1454]: time="2024-12-13T14:08:50.172148431Z" level=info msg="TearDown network for sandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" successfully" Dec 13 14:08:50.180717 env[1454]: time="2024-12-13T14:08:50.180670865Z" level=info msg="RemovePodSandbox \"8bbe5ce3c3e51d2be83609579d4693df6800e92eb498ec0356bc9d2d15c7ffb6\" returns successfully" Dec 13 14:08:50.181402 env[1454]: time="2024-12-13T14:08:50.181375421Z" level=info msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.223 [WARNING][5148] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b5999b9-0821-46d4-96d9-c5ff2049c929", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995", Pod:"calico-apiserver-5665844f64-ntzm4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac39513eccf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.223 [INFO][5148] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.223 [INFO][5148] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" iface="eth0" netns="" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.223 [INFO][5148] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.223 [INFO][5148] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.256 [INFO][5155] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.256 [INFO][5155] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.256 [INFO][5155] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.266 [WARNING][5155] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.266 [INFO][5155] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.268 [INFO][5155] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.271272 env[1454]: 2024-12-13 14:08:50.270 [INFO][5148] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.271853 env[1454]: time="2024-12-13T14:08:50.271806889Z" level=info msg="TearDown network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" successfully" Dec 13 14:08:50.271971 env[1454]: time="2024-12-13T14:08:50.271953169Z" level=info msg="StopPodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" returns successfully" Dec 13 14:08:50.272587 env[1454]: time="2024-12-13T14:08:50.272559805Z" level=info msg="RemovePodSandbox for \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" Dec 13 14:08:50.272859 env[1454]: time="2024-12-13T14:08:50.272811524Z" level=info msg="Forcibly stopping sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\"" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.319 [WARNING][5174] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0", GenerateName:"calico-apiserver-5665844f64-", Namespace:"calico-apiserver", SelfLink:"", UID:"0b5999b9-0821-46d4-96d9-c5ff2049c929", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5665844f64", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"e96044b5511e9738367e67dc5cc37b84ad81ac0edab3ed00d7aa1bdc4ff9e995", Pod:"calico-apiserver-5665844f64-ntzm4", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.82.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliac39513eccf", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.319 [INFO][5174] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.319 [INFO][5174] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" iface="eth0" netns="" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.319 [INFO][5174] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.319 [INFO][5174] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.342 [INFO][5180] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.342 [INFO][5180] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.342 [INFO][5180] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.352 [WARNING][5180] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.352 [INFO][5180] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" HandleID="k8s-pod-network.5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--apiserver--5665844f64--ntzm4-eth0" Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.354 [INFO][5180] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.357108 env[1454]: 2024-12-13 14:08:50.355 [INFO][5174] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87" Dec 13 14:08:50.357686 env[1454]: time="2024-12-13T14:08:50.357638422Z" level=info msg="TearDown network for sandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" successfully" Dec 13 14:08:50.369516 env[1454]: time="2024-12-13T14:08:50.369463158Z" level=info msg="RemovePodSandbox \"5ee8647164de0d7c55bd454826cc35a3b0fd8b49cdb536dd0071b7ae432cdb87\" returns successfully" Dec 13 14:08:50.370368 env[1454]: time="2024-12-13T14:08:50.370328633Z" level=info msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.407 [WARNING][5199] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a", Pod:"coredns-6f6b679f8f-lfndj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a67dd7016b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.407 [INFO][5199] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.407 [INFO][5199] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" iface="eth0" netns="" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.407 [INFO][5199] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.407 [INFO][5199] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.430 [INFO][5206] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.430 [INFO][5206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.430 [INFO][5206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.440 [WARNING][5206] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.440 [INFO][5206] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.441 [INFO][5206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.445835 env[1454]: 2024-12-13 14:08:50.443 [INFO][5199] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.445835 env[1454]: time="2024-12-13T14:08:50.444734429Z" level=info msg="TearDown network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" successfully" Dec 13 14:08:50.445835 env[1454]: time="2024-12-13T14:08:50.444770508Z" level=info msg="StopPodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" returns successfully" Dec 13 14:08:50.446895 env[1454]: time="2024-12-13T14:08:50.446865537Z" level=info msg="RemovePodSandbox for \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" Dec 13 14:08:50.447084 env[1454]: time="2024-12-13T14:08:50.447027536Z" level=info msg="Forcibly stopping sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\"" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.488 [WARNING][5226] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"2832dbf7-6ec9-4b2d-8da4-1f574bb1ceb7", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 7, 55, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"0d3f18782b7585b09073719f05669e5f6ee5a21f701e81c6be92ece5c272f56a", Pod:"coredns-6f6b679f8f-lfndj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.82.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5a67dd7016b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.489 [INFO][5226] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.489 [INFO][5226] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" iface="eth0" netns="" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.489 [INFO][5226] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.489 [INFO][5226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.508 [INFO][5232] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.508 [INFO][5232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.508 [INFO][5232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.518 [WARNING][5232] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.518 [INFO][5232] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" HandleID="k8s-pod-network.75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Workload="ci--3510.3.6--a--02735da4ec-k8s-coredns--6f6b679f8f--lfndj-eth0" Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.519 [INFO][5232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.522616 env[1454]: 2024-12-13 14:08:50.521 [INFO][5226] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5" Dec 13 14:08:50.523185 env[1454]: time="2024-12-13T14:08:50.522657325Z" level=info msg="TearDown network for sandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" successfully" Dec 13 14:08:50.532192 env[1454]: time="2024-12-13T14:08:50.532138753Z" level=info msg="RemovePodSandbox \"75198aa19efbe4dd082cc23bc8583d1dfa6cbd2418e270585dd86ea20ff4cbc5\" returns successfully" Dec 13 14:08:50.532795 env[1454]: time="2024-12-13T14:08:50.532747710Z" level=info msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.577 [WARNING][5251] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0", GenerateName:"calico-kube-controllers-544bc7fb8-", Namespace:"calico-system", SelfLink:"", UID:"a821b48b-846c-4038-887d-f8b3fc33acff", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544bc7fb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9", Pod:"calico-kube-controllers-544bc7fb8-rpkdk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8e59a9816b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.578 [INFO][5251] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.578 [INFO][5251] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" iface="eth0" netns="" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.578 [INFO][5251] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.578 [INFO][5251] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.598 [INFO][5258] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.598 [INFO][5258] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.598 [INFO][5258] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.608 [WARNING][5258] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.608 [INFO][5258] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.609 [INFO][5258] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.614119 env[1454]: 2024-12-13 14:08:50.612 [INFO][5251] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.614119 env[1454]: time="2024-12-13T14:08:50.613542990Z" level=info msg="TearDown network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" successfully" Dec 13 14:08:50.614119 env[1454]: time="2024-12-13T14:08:50.613577550Z" level=info msg="StopPodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" returns successfully" Dec 13 14:08:50.614826 env[1454]: time="2024-12-13T14:08:50.614273826Z" level=info msg="RemovePodSandbox for \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" Dec 13 14:08:50.614826 env[1454]: time="2024-12-13T14:08:50.614304346Z" level=info msg="Forcibly stopping sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\"" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.656 [WARNING][5277] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0", GenerateName:"calico-kube-controllers-544bc7fb8-", Namespace:"calico-system", SelfLink:"", UID:"a821b48b-846c-4038-887d-f8b3fc33acff", ResourceVersion:"880", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 14, 8, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"544bc7fb8", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-02735da4ec", ContainerID:"8d39fd4e20df8006c848296d1066220845273f16f462d1b76cec81dd5a2527c9", Pod:"calico-kube-controllers-544bc7fb8-rpkdk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.82.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid8e59a9816b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.656 [INFO][5277] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.656 [INFO][5277] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" iface="eth0" netns="" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.656 [INFO][5277] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.656 [INFO][5277] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.680 [INFO][5283] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.681 [INFO][5283] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.681 [INFO][5283] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.690 [WARNING][5283] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.690 [INFO][5283] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" HandleID="k8s-pod-network.a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Workload="ci--3510.3.6--a--02735da4ec-k8s-calico--kube--controllers--544bc7fb8--rpkdk-eth0" Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.691 [INFO][5283] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 14:08:50.694904 env[1454]: 2024-12-13 14:08:50.693 [INFO][5277] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a" Dec 13 14:08:50.695397 env[1454]: time="2024-12-13T14:08:50.694933827Z" level=info msg="TearDown network for sandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" successfully" Dec 13 14:08:50.706410 env[1454]: time="2024-12-13T14:08:50.705174572Z" level=info msg="RemovePodSandbox \"a00be67bb6c8800997b6d985c6550756826304db870faa5d481481b7f486289a\" returns successfully" Dec 13 14:08:51.720000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.727122 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:08:51.727696 kernel: audit: type=1400 audit(1734098931.720:1356): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.720000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1b40 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.750450 kernel: audit: type=1300 audit(1734098931.720:1356): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1b40 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.720000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:51.807927 kernel: audit: type=1327 audit(1734098931.720:1356): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:51.808082 kernel: audit: type=1400 audit(1734098931.720:1357): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.720000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.720000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1b60 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.921646 kernel: audit: type=1300 audit(1734098931.720:1357): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1b60 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.720000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:51.947653 kernel: audit: type=1327 audit(1734098931.720:1357): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:51.720000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.970726 kernel: audit: type=1400 audit(1734098931.720:1358): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.720000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1ea0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:52.001415 kernel: audit: type=1300 audit(1734098931.720:1358): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1ea0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.720000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:52.026592 kernel: audit: type=1327 audit(1734098931.720:1358): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:51.744000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:52.049373 kernel: audit: type=1400 audit(1734098931.744:1359): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:08:51.744000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029c1ec0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:08:51.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:08:57.044327 kubelet[2484]: I1213 14:08:57.044282 2484 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 14:08:57.099000 audit[5303]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=5303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:57.106500 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:08:57.106577 kernel: audit: type=1325 audit(1734098937.099:1360): table=filter:115 family=2 entries=8 op=nft_register_rule pid=5303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:57.099000 audit[5303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff72a4c40 a2=0 a3=1 items=0 ppid=2613 pid=5303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:57.149194 kernel: audit: type=1300 audit(1734098937.099:1360): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=fffff72a4c40 a2=0 a3=1 items=0 ppid=2613 pid=5303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:57.099000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:57.163244 kernel: audit: type=1327 audit(1734098937.099:1360): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:57.165000 audit[5303]: NETFILTER_CFG table=nat:116 family=2 entries=34 op=nft_register_chain pid=5303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:57.165000 audit[5303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff72a4c40 a2=0 a3=1 items=0 ppid=2613 pid=5303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:57.214530 kernel: audit: type=1325 audit(1734098937.165:1361): table=nat:116 family=2 entries=34 op=nft_register_chain pid=5303 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:08:57.214663 kernel: audit: type=1300 audit(1734098937.165:1361): arch=c00000b7 syscall=211 success=yes exit=11236 a0=3 a1=fffff72a4c40 a2=0 a3=1 items=0 ppid=2613 pid=5303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:08:57.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:08:57.230640 kernel: audit: type=1327 audit(1734098937.165:1361): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:09:06.241382 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.UAhTEy.mount: Deactivated successfully. Dec 13 14:09:08.617064 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.vJ5jpI.mount: Deactivated successfully. Dec 13 14:09:17.746159 update_engine[1445]: I1213 14:09:17.745843 1445 prefs.cc:52] certificate-report-to-send-update not present in /var/lib/update_engine/prefs Dec 13 14:09:17.746159 update_engine[1445]: I1213 14:09:17.745954 1445 prefs.cc:52] certificate-report-to-send-download not present in /var/lib/update_engine/prefs Dec 13 14:09:17.747355 update_engine[1445]: I1213 14:09:17.747182 1445 prefs.cc:52] aleph-version not present in /var/lib/update_engine/prefs Dec 13 14:09:17.747883 update_engine[1445]: I1213 14:09:17.747859 1445 omaha_request_params.cc:62] Current group set to lts Dec 13 14:09:17.748947 update_engine[1445]: I1213 14:09:17.748798 1445 update_attempter.cc:499] Already updated boot flags. Skipping. Dec 13 14:09:17.748947 update_engine[1445]: I1213 14:09:17.748842 1445 update_attempter.cc:643] Scheduling an action processor start. Dec 13 14:09:17.748947 update_engine[1445]: I1213 14:09:17.748862 1445 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:09:17.748947 update_engine[1445]: I1213 14:09:17.748905 1445 prefs.cc:52] previous-version not present in /var/lib/update_engine/prefs Dec 13 14:09:17.751033 locksmithd[1532]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_CHECKING_FOR_UPDATE" NewVersion=0.0.0 NewSize=0 Dec 13 14:09:17.768930 update_engine[1445]: I1213 14:09:17.768880 1445 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:09:17.768930 update_engine[1445]: I1213 14:09:17.768923 1445 omaha_request_action.cc:271] Request: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: Dec 13 14:09:17.768930 update_engine[1445]: I1213 14:09:17.768937 1445 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:09:17.826692 update_engine[1445]: I1213 14:09:17.826645 1445 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:09:17.826977 update_engine[1445]: I1213 14:09:17.826951 1445 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:09:17.891976 update_engine[1445]: E1213 14:09:17.891932 1445 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:09:17.892143 update_engine[1445]: I1213 14:09:17.892055 1445 libcurl_http_fetcher.cc:283] No HTTP response, retry 1 Dec 13 14:09:27.713453 update_engine[1445]: I1213 14:09:27.713399 1445 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:09:27.713854 update_engine[1445]: I1213 14:09:27.713615 1445 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:09:27.713854 update_engine[1445]: I1213 14:09:27.713825 1445 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:09:27.729009 update_engine[1445]: E1213 14:09:27.728976 1445 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:09:27.729124 update_engine[1445]: I1213 14:09:27.729081 1445 libcurl_http_fetcher.cc:283] No HTTP response, retry 2 Dec 13 14:09:30.667000 audit[4442]: AVC avc: denied { watch } for pid=4442 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.4171902479/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c665 tclass=file permissive=0 Dec 13 14:09:30.667000 audit[4442]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400164e900 a2=fc6 a3=0 items=0 ppid=3914 pid=4442 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 key=(null) Dec 13 14:09:30.726417 kernel: audit: type=1400 audit(1734098970.667:1362): avc: denied { watch } for pid=4442 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.4171902479/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c665 tclass=file permissive=0 Dec 13 14:09:30.726515 kernel: audit: type=1300 audit(1734098970.667:1362): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400164e900 a2=fc6 a3=0 items=0 ppid=3914 pid=4442 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 key=(null) Dec 13 14:09:30.726557 kernel: audit: type=1327 audit(1734098970.667:1362): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:30.667000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:30.694000 audit[4589]: AVC avc: denied { watch } for pid=4589 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.1978627435/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c605 tclass=file permissive=0 Dec 13 14:09:30.778254 kernel: audit: type=1400 audit(1734098970.694:1363): avc: denied { watch } for pid=4589 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.1978627435/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c605 tclass=file permissive=0 Dec 13 14:09:30.694000 audit[4589]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400247a040 a2=fc6 a3=0 items=0 ppid=4539 pid=4589 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 key=(null) Dec 13 14:09:30.809625 kernel: audit: type=1300 audit(1734098970.694:1363): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400247a040 a2=fc6 a3=0 items=0 ppid=4539 pid=4589 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 key=(null) Dec 13 14:09:30.809773 kernel: audit: type=1327 audit(1734098970.694:1363): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:30.694000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:09:36.243191 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.xzgz9z.mount: Deactivated successfully. Dec 13 14:09:37.712884 update_engine[1445]: I1213 14:09:37.712467 1445 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:09:37.712884 update_engine[1445]: I1213 14:09:37.712680 1445 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:09:37.712884 update_engine[1445]: I1213 14:09:37.712883 1445 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:09:37.741165 update_engine[1445]: E1213 14:09:37.741124 1445 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:09:37.741317 update_engine[1445]: I1213 14:09:37.741253 1445 libcurl_http_fetcher.cc:283] No HTTP response, retry 3 Dec 13 14:09:38.620521 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.CvScxg.mount: Deactivated successfully. Dec 13 14:09:46.588000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.588000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4006bb0b40 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.641535 kernel: audit: type=1400 audit(1734098986.588:1364): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.641659 kernel: audit: type=1300 audit(1734098986.588:1364): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4006bb0b40 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.588000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.666843 kernel: audit: type=1327 audit(1734098986.588:1364): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.589000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.690946 kernel: audit: type=1400 audit(1734098986.589:1365): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.589000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4006bb0bd0 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.720365 kernel: audit: type=1300 audit(1734098986.589:1365): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4006bb0bd0 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.720549 kernel: audit: type=1327 audit(1734098986.589:1365): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.589000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.597000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.768752 kernel: audit: type=1400 audit(1734098986.597:1366): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.597000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400655fa10 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.797250 kernel: audit: type=1300 audit(1734098986.597:1366): arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400655fa10 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.797374 kernel: audit: type=1327 audit(1734098986.597:1366): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.597000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.846976 kernel: audit: type=1400 audit(1734098986.597:1367): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.597000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006bb0d80 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.597000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.597000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006b4e500 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.597000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.597000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40016e1a40 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:09:46.597000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:09:46.873000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.873000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:46.873000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400146af30 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:46.873000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015dea80 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:46.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:46.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:47.713234 update_engine[1445]: I1213 14:09:47.713063 1445 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:09:47.713555 update_engine[1445]: I1213 14:09:47.713291 1445 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:09:47.713555 update_engine[1445]: I1213 14:09:47.713505 1445 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:09:47.804468 update_engine[1445]: E1213 14:09:47.804428 1445 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:09:47.804626 update_engine[1445]: I1213 14:09:47.804538 1445 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:09:47.804626 update_engine[1445]: I1213 14:09:47.804543 1445 omaha_request_action.cc:621] Omaha request response: Dec 13 14:09:47.804626 update_engine[1445]: E1213 14:09:47.804625 1445 omaha_request_action.cc:640] Omaha request network transfer failed. Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804639 1445 action_processor.cc:68] ActionProcessor::ActionComplete: OmahaRequestAction action failed. Aborting processing. Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804642 1445 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804646 1445 update_attempter.cc:306] Processing Done. Dec 13 14:09:47.804771 update_engine[1445]: E1213 14:09:47.804658 1445 update_attempter.cc:619] Update failed. Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804661 1445 utils.cc:600] Converting error code 2000 to kActionCodeOmahaErrorInHTTPResponse Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804664 1445 payload_state.cc:97] Updating payload state for error code: 37 (kActionCodeOmahaErrorInHTTPResponse) Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804668 1445 payload_state.cc:103] Ignoring failures until we get a valid Omaha response. Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804750 1445 action_processor.cc:36] ActionProcessor::StartProcessing: OmahaRequestAction Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804769 1445 omaha_request_action.cc:270] Posting an Omaha request to disabled Dec 13 14:09:47.804771 update_engine[1445]: I1213 14:09:47.804773 1445 omaha_request_action.cc:271] Request: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.804771 update_engine[1445]: Dec 13 14:09:47.805088 update_engine[1445]: I1213 14:09:47.804777 1445 libcurl_http_fetcher.cc:47] Starting/Resuming transfer Dec 13 14:09:47.805088 update_engine[1445]: I1213 14:09:47.804904 1445 libcurl_http_fetcher.cc:151] Setting up curl options for HTTP Dec 13 14:09:47.805088 update_engine[1445]: I1213 14:09:47.805071 1445 libcurl_http_fetcher.cc:449] Setting up timeout source: 1 seconds. Dec 13 14:09:47.805482 locksmithd[1532]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_REPORTING_ERROR_EVENT" NewVersion=0.0.0 NewSize=0 Dec 13 14:09:47.871800 update_engine[1445]: E1213 14:09:47.871757 1445 libcurl_http_fetcher.cc:266] Unable to get http response code: Could not resolve host: disabled Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871866 1445 libcurl_http_fetcher.cc:297] Transfer resulted in an error (0), 0 bytes downloaded Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871872 1445 omaha_request_action.cc:621] Omaha request response: Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871877 1445 action_processor.cc:65] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871881 1445 action_processor.cc:73] ActionProcessor::ActionComplete: finished last action of type OmahaRequestAction Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871883 1445 update_attempter.cc:306] Processing Done. Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871888 1445 update_attempter.cc:310] Error event sent. Dec 13 14:09:47.871970 update_engine[1445]: I1213 14:09:47.871896 1445 update_check_scheduler.cc:74] Next update check in 45m16s Dec 13 14:09:47.872358 locksmithd[1532]: LastCheckedTime=0 Progress=0 CurrentOperation="UPDATE_STATUS_IDLE" NewVersion=0.0.0 NewSize=0 Dec 13 14:09:48.611077 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.6FYtJC.mount: Deactivated successfully. Dec 13 14:09:51.721000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.727434 kernel: kauditd_printk_skb: 14 callbacks suppressed Dec 13 14:09:51.727557 kernel: audit: type=1400 audit(1734098991.721:1372): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.721000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400215c880 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.780020 kernel: audit: type=1300 audit(1734098991.721:1372): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400215c880 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.721000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.805623 kernel: audit: type=1327 audit(1734098991.721:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.805771 kernel: audit: type=1400 audit(1734098991.721:1373): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.721000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.721000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015deec0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.858435 kernel: audit: type=1300 audit(1734098991.721:1373): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015deec0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.721000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.883589 kernel: audit: type=1327 audit(1734098991.721:1373): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.883727 kernel: audit: type=1400 audit(1734098991.722:1374): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.722000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.722000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015df200 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.938816 kernel: audit: type=1300 audit(1734098991.722:1374): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40015df200 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.963372 kernel: audit: type=1327 audit(1734098991.722:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:09:51.963487 kernel: audit: type=1400 audit(1734098991.744:1375): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.744000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:09:51.744000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40015df220 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:09:51.744000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:06.240003 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.BURBeZ.mount: Deactivated successfully. Dec 13 14:10:08.621022 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.shB5Oq.mount: Deactivated successfully. Dec 13 14:10:14.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.33:22-10.200.16.10:57920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:14.513372 systemd[1]: Started sshd@7-10.200.20.33:22-10.200.16.10:57920.service. Dec 13 14:10:14.518529 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 14:10:14.518661 kernel: audit: type=1130 audit(1734099014.512:1376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.33:22-10.200.16.10:57920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:14.929000 audit[5495]: USER_ACCT pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.930940 sshd[5495]: Accepted publickey for core from 10.200.16.10 port 57920 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:14.932956 sshd[5495]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:14.931000 audit[5495]: CRED_ACQ pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.980779 kernel: audit: type=1101 audit(1734099014.929:1377): pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.980972 kernel: audit: type=1103 audit(1734099014.931:1378): pid=5495 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:14.996467 kernel: audit: type=1006 audit(1734099014.931:1379): pid=5495 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 14:10:14.931000 audit[5495]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff81d0320 a2=3 a3=1 items=0 ppid=1 pid=5495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:15.022258 kernel: audit: type=1300 audit(1734099014.931:1379): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff81d0320 a2=3 a3=1 items=0 ppid=1 pid=5495 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:14.931000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:15.028806 systemd-logind[1444]: New session 10 of user core. Dec 13 14:10:15.031284 kernel: audit: type=1327 audit(1734099014.931:1379): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:15.032407 systemd[1]: Started session-10.scope. Dec 13 14:10:15.036000 audit[5495]: USER_START pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.038000 audit[5497]: CRED_ACQ pid=5497 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.067341 kernel: audit: type=1105 audit(1734099015.036:1380): pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.090229 kernel: audit: type=1103 audit(1734099015.038:1381): pid=5497 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.374445 sshd[5495]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:15.374000 audit[5495]: USER_END pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.378512 systemd-logind[1444]: Session 10 logged out. Waiting for processes to exit. Dec 13 14:10:15.379887 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 14:10:15.381270 systemd-logind[1444]: Removed session 10. Dec 13 14:10:15.382089 systemd[1]: sshd@7-10.200.20.33:22-10.200.16.10:57920.service: Deactivated successfully. Dec 13 14:10:15.375000 audit[5495]: CRED_DISP pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.424543 kernel: audit: type=1106 audit(1734099015.374:1382): pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.424670 kernel: audit: type=1104 audit(1734099015.375:1383): pid=5495 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:15.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.33:22-10.200.16.10:57920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:20.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.33:22-10.200.16.10:34198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:20.446275 systemd[1]: Started sshd@8-10.200.20.33:22-10.200.16.10:34198.service. Dec 13 14:10:20.451602 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:20.451746 kernel: audit: type=1130 audit(1734099020.445:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.33:22-10.200.16.10:34198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:20.864000 audit[5508]: USER_ACCT pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:20.866044 sshd[5508]: Accepted publickey for core from 10.200.16.10 port 34198 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:20.894310 kernel: audit: type=1101 audit(1734099020.864:1386): pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:20.893000 audit[5508]: CRED_ACQ pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:20.894762 sshd[5508]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:20.933553 kernel: audit: type=1103 audit(1734099020.893:1387): pid=5508 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:20.933694 kernel: audit: type=1006 audit(1734099020.893:1388): pid=5508 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 14:10:20.893000 audit[5508]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe98ecaf0 a2=3 a3=1 items=0 ppid=1 pid=5508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.958747 kernel: audit: type=1300 audit(1734099020.893:1388): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe98ecaf0 a2=3 a3=1 items=0 ppid=1 pid=5508 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:20.893000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:20.967498 kernel: audit: type=1327 audit(1734099020.893:1388): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:20.971175 systemd-logind[1444]: New session 11 of user core. Dec 13 14:10:20.971856 systemd[1]: Started session-11.scope. Dec 13 14:10:20.975000 audit[5508]: USER_START pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:20.977000 audit[5510]: CRED_ACQ pid=5510 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.025067 kernel: audit: type=1105 audit(1734099020.975:1389): pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.025185 kernel: audit: type=1103 audit(1734099020.977:1390): pid=5510 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.507643 sshd[5508]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:21.507000 audit[5508]: USER_END pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.541101 systemd[1]: sshd@8-10.200.20.33:22-10.200.16.10:34198.service: Deactivated successfully. Dec 13 14:10:21.541983 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 14:10:21.542598 systemd-logind[1444]: Session 11 logged out. Waiting for processes to exit. Dec 13 14:10:21.543302 kernel: audit: type=1106 audit(1734099021.507:1391): pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.507000 audit[5508]: CRED_DISP pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:21.543917 systemd-logind[1444]: Removed session 11. Dec 13 14:10:21.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.33:22-10.200.16.10:34198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:21.568223 kernel: audit: type=1104 audit(1734099021.507:1392): pid=5508 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:26.578039 systemd[1]: Started sshd@9-10.200.20.33:22-10.200.16.10:34212.service. Dec 13 14:10:26.576000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.16.10:34212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:26.584045 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:26.584178 kernel: audit: type=1130 audit(1734099026.576:1394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.16.10:34212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:27.001000 audit[5523]: USER_ACCT pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.003488 sshd[5523]: Accepted publickey for core from 10.200.16.10 port 34212 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:27.005662 sshd[5523]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:27.004000 audit[5523]: CRED_ACQ pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.041177 systemd[1]: Started session-12.scope. Dec 13 14:10:27.042570 systemd-logind[1444]: New session 12 of user core. Dec 13 14:10:27.051838 kernel: audit: type=1101 audit(1734099027.001:1395): pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.052010 kernel: audit: type=1103 audit(1734099027.004:1396): pid=5523 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.071735 kernel: audit: type=1006 audit(1734099027.004:1397): pid=5523 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 14:10:27.072277 kernel: audit: type=1300 audit(1734099027.004:1397): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0eeb020 a2=3 a3=1 items=0 ppid=1 pid=5523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.004000 audit[5523]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0eeb020 a2=3 a3=1 items=0 ppid=1 pid=5523 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:27.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:27.109885 kernel: audit: type=1327 audit(1734099027.004:1397): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:27.110034 kernel: audit: type=1105 audit(1734099027.051:1398): pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.051000 audit[5523]: USER_START pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.053000 audit[5525]: CRED_ACQ pid=5525 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.158092 kernel: audit: type=1103 audit(1734099027.053:1399): pid=5525 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.389451 sshd[5523]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:27.389000 audit[5523]: USER_END pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.392727 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 14:10:27.393457 systemd[1]: sshd@9-10.200.20.33:22-10.200.16.10:34212.service: Deactivated successfully. Dec 13 14:10:27.389000 audit[5523]: CRED_DISP pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.418154 systemd-logind[1444]: Session 12 logged out. Waiting for processes to exit. Dec 13 14:10:27.419142 systemd-logind[1444]: Removed session 12. Dec 13 14:10:27.439265 kernel: audit: type=1106 audit(1734099027.389:1400): pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.439431 kernel: audit: type=1104 audit(1734099027.389:1401): pid=5523 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:27.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.33:22-10.200.16.10:34212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:30.668000 audit[4442]: AVC avc: denied { watch } for pid=4442 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.4171902479/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c665 tclass=file permissive=0 Dec 13 14:10:30.668000 audit[4442]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001682980 a2=fc6 a3=0 items=0 ppid=3914 pid=4442 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 key=(null) Dec 13 14:10:30.668000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:30.695000 audit[4589]: AVC avc: denied { watch } for pid=4589 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.1978627435/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c605 tclass=file permissive=0 Dec 13 14:10:30.695000 audit[4589]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40023ea320 a2=fc6 a3=0 items=0 ppid=4539 pid=4589 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 key=(null) Dec 13 14:10:30.695000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:10:32.475503 systemd[1]: Started sshd@10-10.200.20.33:22-10.200.16.10:60318.service. Dec 13 14:10:32.503957 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:10:32.504075 kernel: audit: type=1130 audit(1734099032.474:1405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.16.10:60318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:32.474000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.16.10:60318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:32.887000 audit[5536]: USER_ACCT pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.888799 sshd[5536]: Accepted publickey for core from 10.200.16.10 port 60318 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:32.890860 sshd[5536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:32.889000 audit[5536]: CRED_ACQ pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.937540 kernel: audit: type=1101 audit(1734099032.887:1406): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.937653 kernel: audit: type=1103 audit(1734099032.889:1407): pid=5536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.951795 kernel: audit: type=1006 audit(1734099032.889:1408): pid=5536 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 14:10:32.889000 audit[5536]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebe23ee0 a2=3 a3=1 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:32.956036 systemd-logind[1444]: New session 13 of user core. Dec 13 14:10:32.956648 systemd[1]: Started session-13.scope. Dec 13 14:10:32.977249 kernel: audit: type=1300 audit(1734099032.889:1408): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffebe23ee0 a2=3 a3=1 items=0 ppid=1 pid=5536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:32.889000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:32.985943 kernel: audit: type=1327 audit(1734099032.889:1408): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:32.986030 kernel: audit: type=1105 audit(1734099032.956:1409): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.956000 audit[5536]: USER_START pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:32.961000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.037336 kernel: audit: type=1103 audit(1734099032.961:1410): pid=5538 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.287444 sshd[5536]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:33.287000 audit[5536]: USER_END pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.293293 systemd-logind[1444]: Session 13 logged out. Waiting for processes to exit. Dec 13 14:10:33.294525 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 14:10:33.295669 systemd-logind[1444]: Removed session 13. Dec 13 14:10:33.296320 systemd[1]: sshd@10-10.200.20.33:22-10.200.16.10:60318.service: Deactivated successfully. Dec 13 14:10:33.290000 audit[5536]: CRED_DISP pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.338531 kernel: audit: type=1106 audit(1734099033.287:1411): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.338668 kernel: audit: type=1104 audit(1734099033.290:1412): pid=5536 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.33:22-10.200.16.10:60318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:33.356920 systemd[1]: Started sshd@11-10.200.20.33:22-10.200.16.10:60320.service. Dec 13 14:10:33.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.33:22-10.200.16.10:60320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:33.761000 audit[5549]: USER_ACCT pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.763096 sshd[5549]: Accepted publickey for core from 10.200.16.10 port 60320 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:33.762000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.762000 audit[5549]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd69e6a20 a2=3 a3=1 items=0 ppid=1 pid=5549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:33.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:33.764498 sshd[5549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:33.769043 systemd-logind[1444]: New session 14 of user core. Dec 13 14:10:33.769505 systemd[1]: Started session-14.scope. Dec 13 14:10:33.773000 audit[5549]: USER_START pid=5549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:33.774000 audit[5551]: CRED_ACQ pid=5551 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.191413 sshd[5549]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:34.191000 audit[5549]: USER_END pid=5549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.191000 audit[5549]: CRED_DISP pid=5549 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.194173 systemd[1]: sshd@11-10.200.20.33:22-10.200.16.10:60320.service: Deactivated successfully. Dec 13 14:10:34.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.33:22-10.200.16.10:60320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.195075 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 14:10:34.195626 systemd-logind[1444]: Session 14 logged out. Waiting for processes to exit. Dec 13 14:10:34.197247 systemd-logind[1444]: Removed session 14. Dec 13 14:10:34.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.33:22-10.200.16.10:60334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:34.260751 systemd[1]: Started sshd@12-10.200.20.33:22-10.200.16.10:60334.service. Dec 13 14:10:34.678000 audit[5559]: USER_ACCT pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.679854 sshd[5559]: Accepted publickey for core from 10.200.16.10 port 60334 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:34.679000 audit[5559]: CRED_ACQ pid=5559 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.680000 audit[5559]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc057a400 a2=3 a3=1 items=0 ppid=1 pid=5559 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:34.680000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:34.681537 sshd[5559]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:34.686719 systemd[1]: Started session-15.scope. Dec 13 14:10:34.688065 systemd-logind[1444]: New session 15 of user core. Dec 13 14:10:34.690000 audit[5559]: USER_START pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:34.692000 audit[5561]: CRED_ACQ pid=5561 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.069057 sshd[5559]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:35.068000 audit[5559]: USER_END pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.069000 audit[5559]: CRED_DISP pid=5559 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:35.071958 systemd-logind[1444]: Session 15 logged out. Waiting for processes to exit. Dec 13 14:10:35.072160 systemd[1]: sshd@12-10.200.20.33:22-10.200.16.10:60334.service: Deactivated successfully. Dec 13 14:10:35.072926 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 14:10:35.071000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.33:22-10.200.16.10:60334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:35.073652 systemd-logind[1444]: Removed session 15. Dec 13 14:10:36.237050 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.cv8pp1.mount: Deactivated successfully. Dec 13 14:10:38.620289 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.AvqrTP.mount: Deactivated successfully. Dec 13 14:10:40.144277 systemd[1]: Started sshd@13-10.200.20.33:22-10.200.16.10:33208.service. Dec 13 14:10:40.171710 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 14:10:40.171759 kernel: audit: type=1130 audit(1734099040.143:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.33:22-10.200.16.10:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:40.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.33:22-10.200.16.10:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:40.558000 audit[5617]: USER_ACCT pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.561224 sshd[5617]: Accepted publickey for core from 10.200.16.10 port 33208 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:40.584884 kernel: audit: type=1101 audit(1734099040.558:1433): pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.584981 kernel: audit: type=1103 audit(1734099040.582:1434): pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.582000 audit[5617]: CRED_ACQ pid=5617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.584608 sshd[5617]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:40.621375 kernel: audit: type=1006 audit(1734099040.583:1435): pid=5617 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Dec 13 14:10:40.583000 audit[5617]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefa6c5b0 a2=3 a3=1 items=0 ppid=1 pid=5617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.646572 kernel: audit: type=1300 audit(1734099040.583:1435): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffefa6c5b0 a2=3 a3=1 items=0 ppid=1 pid=5617 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:40.583000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:40.655680 kernel: audit: type=1327 audit(1734099040.583:1435): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:40.657770 systemd-logind[1444]: New session 16 of user core. Dec 13 14:10:40.658260 systemd[1]: Started session-16.scope. Dec 13 14:10:40.661000 audit[5617]: USER_START pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.663000 audit[5619]: CRED_ACQ pid=5619 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.713221 kernel: audit: type=1105 audit(1734099040.661:1436): pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.713336 kernel: audit: type=1103 audit(1734099040.663:1437): pid=5619 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.980867 sshd[5617]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:40.981000 audit[5617]: USER_END pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.984950 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 14:10:40.985824 systemd[1]: sshd@13-10.200.20.33:22-10.200.16.10:33208.service: Deactivated successfully. Dec 13 14:10:41.010340 kernel: audit: type=1106 audit(1734099040.981:1438): pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.010476 kernel: audit: type=1104 audit(1734099040.982:1439): pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:40.982000 audit[5617]: CRED_DISP pid=5617 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:41.011071 systemd-logind[1444]: Session 16 logged out. Waiting for processes to exit. Dec 13 14:10:41.012075 systemd-logind[1444]: Removed session 16. Dec 13 14:10:40.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.33:22-10.200.16.10:33208 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.053553 systemd[1]: Started sshd@14-10.200.20.33:22-10.200.16.10:33224.service. Dec 13 14:10:46.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.16.10:33224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.062701 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:10:46.062848 kernel: audit: type=1130 audit(1734099046.052:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.16.10:33224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.479000 audit[5629]: USER_ACCT pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.481349 sshd[5629]: Accepted publickey for core from 10.200.16.10 port 33224 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:46.483586 sshd[5629]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:46.481000 audit[5629]: CRED_ACQ pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.532320 kernel: audit: type=1101 audit(1734099046.479:1442): pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.532538 kernel: audit: type=1103 audit(1734099046.481:1443): pid=5629 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.537440 systemd-logind[1444]: New session 17 of user core. Dec 13 14:10:46.538031 systemd[1]: Started session-17.scope. Dec 13 14:10:46.548263 kernel: audit: type=1006 audit(1734099046.482:1444): pid=5629 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 14:10:46.482000 audit[5629]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3c736b0 a2=3 a3=1 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:46.574637 kernel: audit: type=1300 audit(1734099046.482:1444): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3c736b0 a2=3 a3=1 items=0 ppid=1 pid=5629 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:46.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:46.583403 kernel: audit: type=1327 audit(1734099046.482:1444): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:46.548000 audit[5629]: USER_START pid=5629 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.610707 kernel: audit: type=1105 audit(1734099046.548:1445): pid=5629 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.549000 audit[5631]: CRED_ACQ pid=5631 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.633995 kernel: audit: type=1103 audit(1734099046.549:1446): pid=5631 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.609000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.658506 kernel: audit: type=1400 audit(1734099046.609:1447): avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.658630 kernel: audit: type=1300 audit(1734099046.609:1447): arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400e842900 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400e842900 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.609000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.609000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400e842930 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.609000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.609000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400e842990 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.609000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.609000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4004112060 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.609000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.609000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400d738b40 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.609000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.610000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.610000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40034e2fc0 a2=fc6 a3=0 items=0 ppid=2212 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c931 key=(null) Dec 13 14:10:46.610000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Dec 13 14:10:46.865457 sshd[5629]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:46.865000 audit[5629]: USER_END pid=5629 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.865000 audit[5629]: CRED_DISP pid=5629 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:46.868810 systemd[1]: sshd@14-10.200.20.33:22-10.200.16.10:33224.service: Deactivated successfully. Dec 13 14:10:46.867000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.33:22-10.200.16.10:33224 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:46.869645 systemd-logind[1444]: Session 17 logged out. Waiting for processes to exit. Dec 13 14:10:46.869664 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 14:10:46.870823 systemd-logind[1444]: Removed session 17. Dec 13 14:10:46.873000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.873000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002709980 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:46.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:46.874000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:46.874000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a05e90 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:46.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:48.609562 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.uSQ58w.mount: Deactivated successfully. Dec 13 14:10:51.721000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.728290 kernel: kauditd_printk_skb: 25 callbacks suppressed Dec 13 14:10:51.728364 kernel: audit: type=1400 audit(1734099051.721:1458): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.721000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40016f4560 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.786010 kernel: audit: type=1300 audit(1734099051.721:1458): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40016f4560 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.721000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.810892 kernel: audit: type=1327 audit(1734099051.721:1458): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.727000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.833859 kernel: audit: type=1400 audit(1734099051.727:1459): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.727000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a02940 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.864057 kernel: audit: type=1300 audit(1734099051.727:1459): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a02940 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.727000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.893078 kernel: audit: type=1327 audit(1734099051.727:1459): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.727000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.916216 kernel: audit: type=1400 audit(1734099051.727:1460): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.916405 kernel: audit: type=1300 audit(1734099051.727:1460): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40016f47e0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.727000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40016f47e0 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.727000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.974686 kernel: audit: type=1327 audit(1734099051.727:1460): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.974833 kernel: audit: type=1400 audit(1734099051.745:1461): avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.745000 audit[2361]: AVC avc: denied { watch } for pid=2361 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 14:10:51.987276 systemd[1]: Started sshd@15-10.200.20.33:22-10.200.16.10:40032.service. Dec 13 14:10:51.745000 audit[2361]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40016f4c60 a2=fc6 a3=0 items=0 ppid=2191 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c382,c619 key=(null) Dec 13 14:10:51.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 14:10:51.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.33:22-10.200.16.10:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:52.400000 audit[5661]: USER_ACCT pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.400970 sshd[5661]: Accepted publickey for core from 10.200.16.10 port 40032 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:52.402000 audit[5661]: CRED_ACQ pid=5661 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.402000 audit[5661]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd76ca210 a2=3 a3=1 items=0 ppid=1 pid=5661 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:52.402000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:52.402769 sshd[5661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:52.407573 systemd[1]: Started session-18.scope. Dec 13 14:10:52.408118 systemd-logind[1444]: New session 18 of user core. Dec 13 14:10:52.412000 audit[5661]: USER_START pid=5661 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.413000 audit[5663]: CRED_ACQ pid=5663 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.771916 sshd[5661]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:52.773000 audit[5661]: USER_END pid=5661 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.773000 audit[5661]: CRED_DISP pid=5661 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:52.775292 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 14:10:52.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.33:22-10.200.16.10:40032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:52.776018 systemd-logind[1444]: Session 18 logged out. Waiting for processes to exit. Dec 13 14:10:52.776130 systemd[1]: sshd@15-10.200.20.33:22-10.200.16.10:40032.service: Deactivated successfully. Dec 13 14:10:52.777379 systemd-logind[1444]: Removed session 18. Dec 13 14:10:52.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.33:22-10.200.16.10:40040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:52.844730 systemd[1]: Started sshd@16-10.200.20.33:22-10.200.16.10:40040.service. Dec 13 14:10:53.269000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.269912 sshd[5673]: Accepted publickey for core from 10.200.16.10 port 40040 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:53.271000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.271000 audit[5673]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec778a00 a2=3 a3=1 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:53.271000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:53.271673 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:53.276089 systemd[1]: Started session-19.scope. Dec 13 14:10:53.277251 systemd-logind[1444]: New session 19 of user core. Dec 13 14:10:53.281000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.282000 audit[5675]: CRED_ACQ pid=5675 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.732363 sshd[5673]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:53.733000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.734000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:53.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.33:22-10.200.16.10:40040 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:53.736076 systemd[1]: sshd@16-10.200.20.33:22-10.200.16.10:40040.service: Deactivated successfully. Dec 13 14:10:53.736875 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 14:10:53.738036 systemd-logind[1444]: Session 19 logged out. Waiting for processes to exit. Dec 13 14:10:53.738868 systemd-logind[1444]: Removed session 19. Dec 13 14:10:53.801399 systemd[1]: Started sshd@17-10.200.20.33:22-10.200.16.10:40042.service. Dec 13 14:10:53.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.33:22-10.200.16.10:40042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:54.213000 audit[5683]: USER_ACCT pid=5683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:54.214005 sshd[5683]: Accepted publickey for core from 10.200.16.10 port 40042 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:54.215000 audit[5683]: CRED_ACQ pid=5683 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:54.215000 audit[5683]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd51bfe0 a2=3 a3=1 items=0 ppid=1 pid=5683 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:54.215000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:54.216045 sshd[5683]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:54.220831 systemd[1]: Started session-20.scope. Dec 13 14:10:54.221462 systemd-logind[1444]: New session 20 of user core. Dec 13 14:10:54.226000 audit[5683]: USER_START pid=5683 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:54.227000 audit[5685]: CRED_ACQ pid=5685 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.046000 audit[5696]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:56.046000 audit[5696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffff1e06a40 a2=0 a3=1 items=0 ppid=2613 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:56.046000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:56.052000 audit[5696]: NETFILTER_CFG table=nat:118 family=2 entries=22 op=nft_register_rule pid=5696 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:56.052000 audit[5696]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffff1e06a40 a2=0 a3=1 items=0 ppid=2613 pid=5696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:56.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:56.078000 audit[5700]: NETFILTER_CFG table=filter:119 family=2 entries=32 op=nft_register_rule pid=5700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:56.078000 audit[5700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11944 a0=3 a1=fffffdc7fe50 a2=0 a3=1 items=0 ppid=2613 pid=5700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:56.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:56.088000 audit[5700]: NETFILTER_CFG table=nat:120 family=2 entries=22 op=nft_register_rule pid=5700 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:10:56.088000 audit[5700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6540 a0=3 a1=fffffdc7fe50 a2=0 a3=1 items=0 ppid=2613 pid=5700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:56.088000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:10:56.125249 sshd[5683]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:56.126000 audit[5683]: USER_END pid=5683 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.126000 audit[5683]: CRED_DISP pid=5683 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.128387 systemd[1]: sshd@17-10.200.20.33:22-10.200.16.10:40042.service: Deactivated successfully. Dec 13 14:10:56.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.33:22-10.200.16.10:40042 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:56.129248 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 14:10:56.129785 systemd-logind[1444]: Session 20 logged out. Waiting for processes to exit. Dec 13 14:10:56.130915 systemd-logind[1444]: Removed session 20. Dec 13 14:10:56.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.33:22-10.200.16.10:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:56.193845 systemd[1]: Started sshd@18-10.200.20.33:22-10.200.16.10:40046.service. Dec 13 14:10:56.607000 audit[5703]: USER_ACCT pid=5703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.608208 sshd[5703]: Accepted publickey for core from 10.200.16.10 port 40046 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:56.609000 audit[5703]: CRED_ACQ pid=5703 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.609000 audit[5703]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffca27570 a2=3 a3=1 items=0 ppid=1 pid=5703 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:56.609000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:56.610173 sshd[5703]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:56.615811 systemd-logind[1444]: New session 21 of user core. Dec 13 14:10:56.616534 systemd[1]: Started session-21.scope. Dec 13 14:10:56.622000 audit[5703]: USER_START pid=5703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:56.623000 audit[5705]: CRED_ACQ pid=5705 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.114544 sshd[5703]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:57.115000 audit[5703]: USER_END pid=5703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.121158 kernel: kauditd_printk_skb: 55 callbacks suppressed Dec 13 14:10:57.121297 kernel: audit: type=1106 audit(1734099057.115:1499): pid=5703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.121773 systemd[1]: sshd@18-10.200.20.33:22-10.200.16.10:40046.service: Deactivated successfully. Dec 13 14:10:57.122745 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 14:10:57.124217 systemd-logind[1444]: Session 21 logged out. Waiting for processes to exit. Dec 13 14:10:57.125194 systemd-logind[1444]: Removed session 21. Dec 13 14:10:57.115000 audit[5703]: CRED_DISP pid=5703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.169799 kernel: audit: type=1104 audit(1734099057.115:1500): pid=5703 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.33:22-10.200.16.10:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:57.186219 systemd[1]: Started sshd@19-10.200.20.33:22-10.200.16.10:40054.service. Dec 13 14:10:57.192125 kernel: audit: type=1131 audit(1734099057.121:1501): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.33:22-10.200.16.10:40046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:57.193039 kernel: audit: type=1130 audit(1734099057.185:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.33:22-10.200.16.10:40054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:57.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.33:22-10.200.16.10:40054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:57.602000 audit[5713]: USER_ACCT pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.603679 sshd[5713]: Accepted publickey for core from 10.200.16.10 port 40054 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:10:57.628925 sshd[5713]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:10:57.628000 audit[5713]: CRED_ACQ pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.652375 kernel: audit: type=1101 audit(1734099057.602:1503): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.652496 kernel: audit: type=1103 audit(1734099057.628:1504): pid=5713 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.667281 kernel: audit: type=1006 audit(1734099057.628:1505): pid=5713 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Dec 13 14:10:57.628000 audit[5713]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfa65d40 a2=3 a3=1 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:57.672192 systemd-logind[1444]: New session 22 of user core. Dec 13 14:10:57.672808 systemd[1]: Started session-22.scope. Dec 13 14:10:57.695162 kernel: audit: type=1300 audit(1734099057.628:1505): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfa65d40 a2=3 a3=1 items=0 ppid=1 pid=5713 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:10:57.628000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:57.704568 kernel: audit: type=1327 audit(1734099057.628:1505): proctitle=737368643A20636F7265205B707269765D Dec 13 14:10:57.696000 audit[5713]: USER_START pid=5713 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.731815 kernel: audit: type=1105 audit(1734099057.696:1506): pid=5713 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:57.698000 audit[5715]: CRED_ACQ pid=5715 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:58.011636 sshd[5713]: pam_unix(sshd:session): session closed for user core Dec 13 14:10:58.012000 audit[5713]: USER_END pid=5713 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:58.012000 audit[5713]: CRED_DISP pid=5713 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:10:58.015306 systemd[1]: sshd@19-10.200.20.33:22-10.200.16.10:40054.service: Deactivated successfully. Dec 13 14:10:58.015000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.33:22-10.200.16.10:40054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:10:58.016094 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 14:10:58.017388 systemd-logind[1444]: Session 22 logged out. Waiting for processes to exit. Dec 13 14:10:58.018306 systemd-logind[1444]: Removed session 22. Dec 13 14:11:02.308000 audit[5726]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:02.313974 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 14:11:02.314105 kernel: audit: type=1325 audit(1734099062.308:1511): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:02.308000 audit[5726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcfd6df40 a2=0 a3=1 items=0 ppid=2613 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:02.356035 kernel: audit: type=1300 audit(1734099062.308:1511): arch=c00000b7 syscall=211 success=yes exit=3016 a0=3 a1=ffffcfd6df40 a2=0 a3=1 items=0 ppid=2613 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:02.308000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:02.370724 kernel: audit: type=1327 audit(1734099062.308:1511): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:02.331000 audit[5726]: NETFILTER_CFG table=nat:122 family=2 entries=106 op=nft_register_chain pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:02.386275 kernel: audit: type=1325 audit(1734099062.331:1512): table=nat:122 family=2 entries=106 op=nft_register_chain pid=5726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 14:11:02.386470 kernel: audit: type=1300 audit(1734099062.331:1512): arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffcfd6df40 a2=0 a3=1 items=0 ppid=2613 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:02.331000 audit[5726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=49452 a0=3 a1=ffffcfd6df40 a2=0 a3=1 items=0 ppid=2613 pid=5726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:02.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:02.428517 kernel: audit: type=1327 audit(1734099062.331:1512): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 14:11:03.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.33:22-10.200.16.10:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:03.089357 systemd[1]: Started sshd@20-10.200.20.33:22-10.200.16.10:54368.service. Dec 13 14:11:03.113263 kernel: audit: type=1130 audit(1734099063.089:1513): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.33:22-10.200.16.10:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:03.516000 audit[5729]: USER_ACCT pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.517173 sshd[5729]: Accepted publickey for core from 10.200.16.10 port 54368 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:03.519531 sshd[5729]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:03.518000 audit[5729]: CRED_ACQ pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.570727 kernel: audit: type=1101 audit(1734099063.516:1514): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.570904 kernel: audit: type=1103 audit(1734099063.518:1515): pid=5729 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.575190 systemd[1]: Started session-23.scope. Dec 13 14:11:03.575729 systemd-logind[1444]: New session 23 of user core. Dec 13 14:11:03.591337 kernel: audit: type=1006 audit(1734099063.518:1516): pid=5729 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 14:11:03.518000 audit[5729]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc512e00 a2=3 a3=1 items=0 ppid=1 pid=5729 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:03.518000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:03.600000 audit[5729]: USER_START pid=5729 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.602000 audit[5731]: CRED_ACQ pid=5731 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.923641 sshd[5729]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:03.924000 audit[5729]: USER_END pid=5729 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.924000 audit[5729]: CRED_DISP pid=5729 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:03.926029 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 14:11:03.926829 systemd[1]: sshd@20-10.200.20.33:22-10.200.16.10:54368.service: Deactivated successfully. Dec 13 14:11:03.926000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.33:22-10.200.16.10:54368 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:03.927589 systemd-logind[1444]: Session 23 logged out. Waiting for processes to exit. Dec 13 14:11:03.928278 systemd-logind[1444]: Removed session 23. Dec 13 14:11:06.236879 systemd[1]: run-containerd-runc-k8s.io-c7da0d4f8c3423db7304f1355aafa9c8cf2c0ab21554fbf50ad03b0fedd7d9f1-runc.j7Ekn3.mount: Deactivated successfully. Dec 13 14:11:08.621877 systemd[1]: run-containerd-runc-k8s.io-b6fe648483061d72e4c6f8114cb2314a1e8b0897fe328d0e6c1cbcb567515b29-runc.K400GU.mount: Deactivated successfully. Dec 13 14:11:08.992300 systemd[1]: Started sshd@21-10.200.20.33:22-10.200.16.10:43082.service. Dec 13 14:11:09.021824 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:11:09.021945 kernel: audit: type=1130 audit(1734099068.992:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.16.10:43082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:08.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.16.10:43082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:09.397000 audit[5783]: USER_ACCT pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.398049 sshd[5783]: Accepted publickey for core from 10.200.16.10 port 43082 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:09.402044 sshd[5783]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:09.400000 audit[5783]: CRED_ACQ pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.446018 kernel: audit: type=1101 audit(1734099069.397:1523): pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.446194 kernel: audit: type=1103 audit(1734099069.400:1524): pid=5783 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.460495 kernel: audit: type=1006 audit(1734099069.401:1525): pid=5783 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 14:11:09.401000 audit[5783]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2916190 a2=3 a3=1 items=0 ppid=1 pid=5783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:09.485045 kernel: audit: type=1300 audit(1734099069.401:1525): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2916190 a2=3 a3=1 items=0 ppid=1 pid=5783 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:09.401000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:09.493560 kernel: audit: type=1327 audit(1734099069.401:1525): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:09.496915 systemd[1]: Started session-24.scope. Dec 13 14:11:09.497357 systemd-logind[1444]: New session 24 of user core. Dec 13 14:11:09.501000 audit[5783]: USER_START pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.529812 kernel: audit: type=1105 audit(1734099069.501:1526): pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.529941 kernel: audit: type=1103 audit(1734099069.529:1527): pid=5785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.529000 audit[5785]: CRED_ACQ pid=5785 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.844858 sshd[5783]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:09.845000 audit[5783]: USER_END pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.850081 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 14:11:09.851089 systemd[1]: sshd@21-10.200.20.33:22-10.200.16.10:43082.service: Deactivated successfully. Dec 13 14:11:09.873710 systemd-logind[1444]: Session 24 logged out. Waiting for processes to exit. Dec 13 14:11:09.848000 audit[5783]: CRED_DISP pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.896193 kernel: audit: type=1106 audit(1734099069.845:1528): pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.896313 kernel: audit: type=1104 audit(1734099069.848:1529): pid=5783 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:09.851000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.33:22-10.200.16.10:43082 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:09.896802 systemd-logind[1444]: Removed session 24. Dec 13 14:11:14.916000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.16.10:43090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:14.916998 systemd[1]: Started sshd@22-10.200.20.33:22-10.200.16.10:43090.service. Dec 13 14:11:14.922922 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:14.923074 kernel: audit: type=1130 audit(1734099074.916:1531): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.16.10:43090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:15.342000 audit[5804]: USER_ACCT pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.343434 sshd[5804]: Accepted publickey for core from 10.200.16.10 port 43090 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:15.368000 audit[5804]: CRED_ACQ pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.369097 sshd[5804]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:15.391412 kernel: audit: type=1101 audit(1734099075.342:1532): pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.391555 kernel: audit: type=1103 audit(1734099075.368:1533): pid=5804 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.405872 kernel: audit: type=1006 audit(1734099075.368:1534): pid=5804 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 14:11:15.368000 audit[5804]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe7860b0 a2=3 a3=1 items=0 ppid=1 pid=5804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:15.430989 kernel: audit: type=1300 audit(1734099075.368:1534): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe7860b0 a2=3 a3=1 items=0 ppid=1 pid=5804 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:15.368000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:15.439678 kernel: audit: type=1327 audit(1734099075.368:1534): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:15.443515 systemd[1]: Started session-25.scope. Dec 13 14:11:15.443914 systemd-logind[1444]: New session 25 of user core. Dec 13 14:11:15.448000 audit[5804]: USER_START pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.450000 audit[5806]: CRED_ACQ pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.496902 kernel: audit: type=1105 audit(1734099075.448:1535): pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.497027 kernel: audit: type=1103 audit(1734099075.450:1536): pid=5806 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.778476 sshd[5804]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:15.780000 audit[5804]: USER_END pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.783579 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 14:11:15.784484 systemd[1]: sshd@22-10.200.20.33:22-10.200.16.10:43090.service: Deactivated successfully. Dec 13 14:11:15.809697 systemd-logind[1444]: Session 25 logged out. Waiting for processes to exit. Dec 13 14:11:15.781000 audit[5804]: CRED_DISP pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.810860 systemd-logind[1444]: Removed session 25. Dec 13 14:11:15.833985 kernel: audit: type=1106 audit(1734099075.780:1537): pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.834134 kernel: audit: type=1104 audit(1734099075.781:1538): pid=5804 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:15.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.33:22-10.200.16.10:43090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:20.850956 systemd[1]: Started sshd@23-10.200.20.33:22-10.200.16.10:58950.service. Dec 13 14:11:20.882830 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:20.882953 kernel: audit: type=1130 audit(1734099080.850:1540): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.16.10:58950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:20.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.16.10:58950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:21.275000 audit[5818]: USER_ACCT pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.278531 sshd[5818]: Accepted publickey for core from 10.200.16.10 port 58950 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:21.280753 sshd[5818]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:21.278000 audit[5818]: CRED_ACQ pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.328209 kernel: audit: type=1101 audit(1734099081.275:1541): pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.328353 kernel: audit: type=1103 audit(1734099081.278:1542): pid=5818 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.343704 kernel: audit: type=1006 audit(1734099081.278:1543): pid=5818 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 14:11:21.278000 audit[5818]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1368cb0 a2=3 a3=1 items=0 ppid=1 pid=5818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.370786 kernel: audit: type=1300 audit(1734099081.278:1543): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1368cb0 a2=3 a3=1 items=0 ppid=1 pid=5818 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:21.374109 systemd-logind[1444]: New session 26 of user core. Dec 13 14:11:21.374657 systemd[1]: Started session-26.scope. Dec 13 14:11:21.278000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:21.385172 kernel: audit: type=1327 audit(1734099081.278:1543): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:21.388000 audit[5818]: USER_START pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.417000 audit[5823]: CRED_ACQ pid=5823 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.444765 kernel: audit: type=1105 audit(1734099081.388:1544): pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.445016 kernel: audit: type=1103 audit(1734099081.417:1545): pid=5823 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.746483 sshd[5818]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:21.747000 audit[5818]: USER_END pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.747000 audit[5818]: CRED_DISP pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.777098 systemd[1]: sshd@23-10.200.20.33:22-10.200.16.10:58950.service: Deactivated successfully. Dec 13 14:11:21.777958 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 14:11:21.798743 kernel: audit: type=1106 audit(1734099081.747:1546): pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.798871 kernel: audit: type=1104 audit(1734099081.747:1547): pid=5818 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:21.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.33:22-10.200.16.10:58950 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:21.799482 systemd-logind[1444]: Session 26 logged out. Waiting for processes to exit. Dec 13 14:11:21.800321 systemd-logind[1444]: Removed session 26. Dec 13 14:11:26.820021 systemd[1]: Started sshd@24-10.200.20.33:22-10.200.16.10:58966.service. Dec 13 14:11:26.848578 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 14:11:26.848703 kernel: audit: type=1130 audit(1734099086.819:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.16.10:58966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:26.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.16.10:58966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:27.231000 audit[5835]: USER_ACCT pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.232551 sshd[5835]: Accepted publickey for core from 10.200.16.10 port 58966 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:27.234592 sshd[5835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:27.234000 audit[5835]: CRED_ACQ pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.281888 kernel: audit: type=1101 audit(1734099087.231:1550): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.282006 kernel: audit: type=1103 audit(1734099087.234:1551): pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.286843 systemd[1]: Started session-27.scope. Dec 13 14:11:27.288224 systemd-logind[1444]: New session 27 of user core. Dec 13 14:11:27.297498 kernel: audit: type=1006 audit(1734099087.234:1552): pid=5835 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 14:11:27.234000 audit[5835]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe04cb380 a2=3 a3=1 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:27.328592 kernel: audit: type=1300 audit(1734099087.234:1552): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe04cb380 a2=3 a3=1 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:27.330420 kernel: audit: type=1327 audit(1734099087.234:1552): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:27.234000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:27.292000 audit[5835]: USER_START pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.364943 kernel: audit: type=1105 audit(1734099087.292:1553): pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.365373 kernel: audit: type=1103 audit(1734099087.292:1554): pid=5837 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.292000 audit[5837]: CRED_ACQ pid=5837 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.601284 sshd[5835]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:27.602000 audit[5835]: USER_END pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.602000 audit[5835]: CRED_DISP pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.631640 systemd[1]: sshd@24-10.200.20.33:22-10.200.16.10:58966.service: Deactivated successfully. Dec 13 14:11:27.632574 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 14:11:27.654504 kernel: audit: type=1106 audit(1734099087.602:1555): pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.654638 kernel: audit: type=1104 audit(1734099087.602:1556): pid=5835 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:27.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.33:22-10.200.16.10:58966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:27.655573 systemd-logind[1444]: Session 27 logged out. Waiting for processes to exit. Dec 13 14:11:27.656716 systemd-logind[1444]: Removed session 27. Dec 13 14:11:30.670000 audit[4442]: AVC avc: denied { watch } for pid=4442 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.4171902479/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c448,c665 tclass=file permissive=0 Dec 13 14:11:30.670000 audit[4442]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400164f4e0 a2=fc6 a3=0 items=0 ppid=3914 pid=4442 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c448,c665 key=(null) Dec 13 14:11:30.670000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:11:30.697000 audit[4589]: AVC avc: denied { watch } for pid=4589 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_14_08_13.1978627435/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c521,c605 tclass=file permissive=0 Dec 13 14:11:30.697000 audit[4589]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40023ea2e0 a2=fc6 a3=0 items=0 ppid=4539 pid=4589 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c521,c605 key=(null) Dec 13 14:11:30.697000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 14:11:32.673138 systemd[1]: Started sshd@25-10.200.20.33:22-10.200.16.10:36982.service. Dec 13 14:11:32.701620 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 14:11:32.701749 kernel: audit: type=1130 audit(1734099092.673:1560): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.16.10:36982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:32.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.16.10:36982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:33.100000 audit[5849]: USER_ACCT pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.102514 sshd[5849]: Accepted publickey for core from 10.200.16.10 port 36982 ssh2: RSA SHA256:xuCpWY3jYETt01AJgPfaKRWNP61F/EGSdrGlXn/pObI Dec 13 14:11:33.103388 sshd[5849]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 14:11:33.102000 audit[5849]: CRED_ACQ pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.153078 kernel: audit: type=1101 audit(1734099093.100:1561): pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.153245 kernel: audit: type=1103 audit(1734099093.102:1562): pid=5849 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.168654 kernel: audit: type=1006 audit(1734099093.102:1563): pid=5849 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 14:11:33.102000 audit[5849]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff97f0a70 a2=3 a3=1 items=0 ppid=1 pid=5849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:33.195091 kernel: audit: type=1300 audit(1734099093.102:1563): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff97f0a70 a2=3 a3=1 items=0 ppid=1 pid=5849 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 14:11:33.102000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:33.204704 kernel: audit: type=1327 audit(1734099093.102:1563): proctitle=737368643A20636F7265205B707269765D Dec 13 14:11:33.207546 systemd-logind[1444]: New session 28 of user core. Dec 13 14:11:33.208495 systemd[1]: Started session-28.scope. Dec 13 14:11:33.213000 audit[5849]: USER_START pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.243145 kernel: audit: type=1105 audit(1734099093.213:1564): pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.243421 kernel: audit: type=1103 audit(1734099093.242:1565): pid=5851 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.242000 audit[5851]: CRED_ACQ pid=5851 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.567454 sshd[5849]: pam_unix(sshd:session): session closed for user core Dec 13 14:11:33.568000 audit[5849]: USER_END pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.570899 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 14:11:33.571720 systemd[1]: sshd@25-10.200.20.33:22-10.200.16.10:36982.service: Deactivated successfully. Dec 13 14:11:33.569000 audit[5849]: CRED_DISP pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.620359 kernel: audit: type=1106 audit(1734099093.568:1566): pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.620494 kernel: audit: type=1104 audit(1734099093.569:1567): pid=5849 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 14:11:33.620889 systemd-logind[1444]: Session 28 logged out. Waiting for processes to exit. Dec 13 14:11:33.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.33:22-10.200.16.10:36982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 14:11:33.621907 systemd-logind[1444]: Removed session 28.